Server Component Details | Group: io.mosip.pms ---- Artifact: partner-management-service ---- version: 1.2.1.0 ---- Commit ID: 50926c8 Group: io.mosip.pms ---- Artifact: policy-management-service ---- version: 1.2.1.0 ---- Commit ID: 50926c8 | End Points used |
Domain: esignet.es-qa.mosip.net ---- Module: esignet ---- End Point: v1/esignet/linked-authorization/authenticate
Domain: esignet.es-qa.mosip.net ---- Module: esignet ---- End Point: v1/esignet/oidc/.well-known/openid-configuration
Domain: esignet.es-qa.mosip.net ---- Module: esignet ---- End Point: v1/esignet/linked-authorization/v2/consent
Domain: api-internal.es-qa.mosip.net ---- Module: authmanager ---- End Point: v1/authmanager/authenticate/clientidsecretkey
Domain: esignet.es-qa.mosip.net ---- Module: esignet ---- End Point: v1/esignet/linked-authorization/v2/authenticate
Domain: esignet.es-qa.mosip.net ---- Module: esignet ---- End Point: v1/esignet/authorization/send-otp
Domain: esignet.es-qa.mosip.net ---- Module: esignet ---- End Point: v1/esignet/authorization/v2/authenticate
Domain: esignet.es-qa.mosip.net ---- Module: esignet ---- End Point: v1/esignet/linked-authorization/link-code
Domain: esignet.es-qa.mosip.net ---- Module: esignet ---- End Point: v1/esignet/linked-authorization/link-auth-code
Domain: esignet.es-qa.mosip.net ---- Module: esignet ---- End Point: v1/esignet/actuator/env
Domain: esignet.es-qa.mosip.net ---- Module: esignet ---- End Point: v1/esignet/binding/binding-otp
Domain: esignet.es-qa.mosip.net ---- Module: esignet ---- End Point: v1/esignet/linked-authorization/link-transaction
Domain: esignet.es-qa.mosip.net ---- Module: esignet ---- End Point: v1/esignet/linked-authorization/consent
Domain: esignet.es-qa.mosip.net ---- Module: esignet ---- End Point: v1/esignet/authorization/oauth-details
Domain: esignet.es-qa.mosip.net ---- Module: esignet ---- End Point: v1/esignet/client-mgmt/oauth-client/{clientId}
Domain: esignet.es-qa.mosip.net ---- Module: esignet ---- End Point: v1/esignet/linked-authorization/link-status
Domain: esignet.es-qa.mosip.net ---- Module: esignet ---- End Point: v1/esignet/oidc/userinfo
Domain: esignet.es-qa.mosip.net ---- Module: esignet ---- End Point: v1/esignet/client-mgmt/oidc-client/{clientId}
Domain: esignet.es-qa.mosip.net ---- Module: esignet ---- End Point: v1/esignet/client-mgmt/oidc-client
Domain: esignet.es-qa.mosip.net ---- Module: esignet ---- End Point: v1/esignet/authorization/authenticate
Domain: esignet.es-qa.mosip.net ---- Module: esignet ---- End Point: v1/esignet/authorization/auth-code
Domain: esignet.es-qa.mosip.net ---- Module: esignet ---- End Point: v1/esignet/binding/wallet-binding
Domain: esignet.es-qa.mosip.net ---- Module: esignet ---- End Point: v1/esignet/client-mgmt/oauth-client
Domain: api.es-qa.mosip.net ---- Module: mock-identity-system ---- End Point: v1/mock-identity-system/identity
Domain: esignet.es-qa.mosip.net ---- Module: esignet ---- End Point: v1/esignet/authorization/v2/oauth-details | |||||
|---|---|---|---|---|---|---|---|---|
Server Errors No server errors | ||||||||
| eSignet Pre-requisite API Test ---- Report Date: 2025-02-17 ---- Tested Environment: es-qa ---- Commit Id is: 8c38fcd7 & Branch Name is:release-1.5.x | ||||||||
| Test Scenario | # Total | # Passed | # Skipped | # Failed | # Ignored | # Known_Issues | Execution Time (HH:MM:SS) | |
| AddIdentityMock | 24 | 23 | 0 | 0 | 1 | 0 | 00:00:16 | |
| AddIdentity | 24 | 0 | 0 | 0 | 24 | 0 | 00:00:00 | |
| CreatePolicyGroup | 4 | 0 | 0 | 0 | 4 | 0 | 00:00:00 | |
| DefinePolicy | 15 | 0 | 0 | 0 | 15 | 0 | 00:00:00 | |
| PublishPolicy | 8 | 0 | 0 | 0 | 8 | 0 | 00:00:00 | |
| CreatePartner | 8 | 0 | 0 | 0 | 8 | 0 | 00:00:00 | |
| UploadCACertificate | 16 | 0 | 0 | 0 | 16 | 0 | 00:00:00 | |
| UploadPartnerCertificate | 8 | 0 | 0 | 0 | 8 | 0 | 00:00:00 | |
| updatePartnerCertificate | 1 | 0 | 0 | 0 | 1 | 0 | 00:00:00 | |
| RequestAPIKeyForAuthPartner | 6 | 0 | 0 | 0 | 6 | 0 | 00:00:00 | |
| ApproveAPIKey | 6 | 0 | 0 | 0 | 6 | 0 | 00:00:00 | |
| UpdatePolicy | 1 | 0 | 0 | 0 | 1 | 0 | 00:00:00 | |
| DeactivatePolicy | 1 | 0 | 0 | 0 | 1 | 0 | 00:00:00 | |
| GenerateMispLK | 3 | 0 | 0 | 0 | 3 | 0 | 00:00:00 | |
| GenerateApiKey | 2 | 0 | 0 | 0 | 2 | 0 | 00:00:00 | |
| OIDCClient | 20 | 0 | 0 | 0 | 20 | 0 | 00:00:00 | |
| OIDCClientUpdate | 2 | 0 | 0 | 0 | 2 | 0 | 00:00:00 | |
| GetOidcClient | 2 | 0 | 0 | 0 | 2 | 0 | 00:00:00 | |
| GenerateVID | 16 | 0 | 0 | 0 | 16 | 0 | 00:00:00 | |
| eSignet API Test ---- Report Date: 2025-02-17 ---- Tested Environment: es-qa ---- Commit Id is: 8c38fcd7 & Branch Name is:release-1.5.x | ||||||||
| Test Scenario | # Total | # Passed | # Skipped | # Failed | # Ignored | # Known_Issues | Execution Time (HH:MM:SS) | |
| OIDCClientV2 | 3 | 3 | 0 | 0 | 0 | 0 | 00:00:09 | |
| SendBindingOtp | 32 | 17 | 0 | 0 | 15 | 0 | 00:00:05 | |
| WalletBinding | 64 | 33 | 0 | 0 | 31 | 0 | 00:00:33 | |
| OAuthDetailsRequestLinkedConsent | 4 | 4 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GenerateLinkCodeConsent | 3 | 2 | 0 | 0 | 1 | 0 | 00:00:00 | |
| LinkTransactionConsent | 3 | 2 | 0 | 0 | 1 | 0 | 00:00:00 | |
| GetLinkStatusConsent | 3 | 2 | 0 | 0 | 1 | 0 | 00:00:00 | |
| LinkedAuthenticationConsentWla | 3 | 2 | 0 | 0 | 1 | 0 | 00:00:03 | |
| LinkAuthorizationConsent | 2 | 1 | 0 | 0 | 1 | 0 | 00:00:00 | |
| LinkAuthorizationCodeConsent | 2 | 1 | 0 | 0 | 1 | 0 | 00:00:00 | |
| GenerateTokenLinkedConsent | 2 | 1 | 0 | 0 | 1 | 0 | 00:00:00 | |
| GetOidcUserInfoLinkedConsent | 2 | 1 | 0 | 0 | 1 | 0 | 00:00:00 | |
| OAuthDetailsRequestLinked | 7 | 4 | 0 | 0 | 3 | 0 | 00:00:00 | |
| GenerateLinkCode | 16 | 13 | 0 | 0 | 3 | 0 | 00:00:02 | |
| LinkTransaction | 17 | 14 | 0 | 0 | 3 | 0 | 00:00:02 | |
| GetLinkStatus | 23 | 20 | 0 | 0 | 3 | 0 | 00:02:37 | |
| LinkedAuthenticationWla | 6 | 3 | 0 | 0 | 3 | 0 | 00:00:04 | |
| LinkedAuthorizationConsent | 19 | 16 | 0 | 0 | 3 | 0 | 00:00:02 | |
| LinkAuthorizationCode | 19 | 16 | 0 | 0 | 3 | 0 | 00:00:53 | |
| GenerateTokenLinked | 6 | 3 | 0 | 0 | 3 | 0 | 00:00:01 | |
| GetOidcUserInfoLinked | 6 | 3 | 0 | 0 | 3 | 0 | 00:00:00 | |
| OAuthDetailsRequestNonAuth | 26 | 13 | 0 | 0 | 13 | 0 | 00:00:02 | |
| BioNonAuth | 24 | 0 | 0 | 0 | 24 | 0 | 00:00:00 | |
| AuthenticateUserNonAuth | 2 | 0 | 0 | 0 | 2 | 0 | 00:00:00 | |
| OAuthDetailsRequestConsent | 7 | 4 | 0 | 0 | 3 | 0 | 00:00:00 | |
| AuthenticateUserConsent | 10 | 5 | 0 | 0 | 5 | 0 | 00:00:01 | |
| AuthorizationCodeConsent | 4 | 2 | 0 | 0 | 2 | 0 | 00:00:00 | |
| GenerateTokenConsent | 4 | 2 | 0 | 0 | 2 | 0 | 00:00:00 | |
| GetOidcUserInfoConsent | 4 | 2 | 0 | 0 | 2 | 0 | 00:00:00 | |
| OAuthDetailsRequest | 84 | 81 | 0 | 0 | 3 | 0 | 00:00:12 | |
| BioAuthIdp | 24 | 0 | 0 | 0 | 24 | 0 | 00:00:00 | |
| SendOtp | 44 | 23 | 0 | 0 | 21 | 0 | 00:00:02 | |
| AuthenticateUser | 54 | 27 | 0 | 0 | 27 | 0 | 00:00:07 | |
| AuthorizationCode | 32 | 16 | 0 | 0 | 16 | 0 | 00:00:01 | |
| GenerateToken | 62 | 31 | 0 | 0 | 31 | 0 | 00:00:07 | |
| GetOidcUserInfo | 4 | 2 | 0 | 0 | 2 | 0 | 00:00:00 | |
| CreateOIDCClient | 32 | 31 | 0 | 0 | 1 | 0 | 00:00:18 | |
| UpdateOIDCClient | 29 | 28 | 0 | 0 | 1 | 0 | 00:00:02 | |
| CreateOIDCClientV2 | 6 | 6 | 0 | 0 | 0 | 0 | 00:00:03 | |
| UpdateOIDCClientV2 | 6 | 6 | 0 | 0 | 0 | 0 | 00:00:00 | |
| OAuthDetailsRequestV2 | 2 | 2 | 0 | 0 | 0 | 0 | 00:00:00 | |
| CreatePolicySunBirdR | 1 | 0 | 0 | 0 | 1 | 0 | 00:00:00 | |
| GetPolicySunBirdR | 1 | 0 | 0 | 0 | 1 | 0 | 00:00:00 | |
| SearchPolicySunBirdR | 1 | 0 | 0 | 0 | 1 | 0 | 00:00:00 | |
| CreateOIDCClientV2SunBirdC | 1 | 0 | 0 | 0 | 1 | 0 | 00:00:00 | |
| OAuthDetailsRequestSunBirdC | 1 | 0 | 0 | 0 | 1 | 0 | 00:00:00 | |
| AuthenticateUserSunBirdC | 1 | 0 | 0 | 0 | 1 | 0 | 00:00:00 | |
| AuthorizationCodeSunBirdC | 1 | 0 | 0 | 0 | 1 | 0 | 00:00:00 | |
| GenerateTokenSunBirdC | 1 | 0 | 0 | 0 | 1 | 0 | 00:00:00 | |
| OAuthDetailsRequestSunBirdCNegTC | 28 | 0 | 0 | 0 | 28 | 0 | 00:00:00 | |
| AuthenticateUserSunBirdCNegTC | 41 | 0 | 0 | 0 | 41 | 0 | 00:00:00 | |
| AuthorizationCodeSunBirdCNegTC | 9 | 0 | 0 | 0 | 9 | 0 | 00:00:00 | |
| GenerateTokenSunBirdCNegTC | 6 | 0 | 0 | 0 | 6 | 0 | 00:00:00 | |
| DeletePolicySunBirdR | 1 | 0 | 0 | 0 | 1 | 0 | 00:00:00 | |
| Total | 962 | 465 | 0 | 0 | 497 | 0 | 00:06:02 | |
| TestCase Number | TestCase | TestCase Description | Execution Time (HH:MM:SS) |
|---|---|---|---|
| AddIdentityMock — Ignored | |||
| ESignet_AddIdentity_BioAuth_smoke_Pos | Add identity with BioAuth | 00:00:00 | |
| AddIdentityMock — Passed | |||
| ESignet_AddIdentity_Consent_Vid_smoke_Pos | Add identity consent Vid | 00:00:00 | |
| ESignet_AddIdentity_Consent_smoke_Pos | Add identity consent | 00:00:00 | |
| ESignet_AddIdentity_Invalid_Scen_smoke_Pos | Add identity with invalid scenario | 00:00:00 | |
| ESignet_AddIdentity_KycAuth_smoke_Pos | Add identity with KycAuth | 00:00:00 | |
| ESignet_AddIdentity_L2_Valid_Parameters_smoke_Neg_Pos | Add identity with password authentication | 00:00:00 | |
| ESignet_AddIdentity_L2_Valid_Parameters_smoke_Pos | Add identity with password authentication | 00:00:00 | |
| ESignet_AddIdentity_Linked_Consent_User2_Vid_smoke_Pos | Add identity linked consent user2 Vid | 00:00:00 | |
| ESignet_AddIdentity_Linked_Consent_User2_smoke_Pos | Add identity linked consent user2 | 00:00:00 | |
| ESignet_AddIdentity_Linked_Consent_Vid_smoke_Pos | Add identity linked consent Vid | 00:00:00 | |
| ESignet_AddIdentity_Linked_Consent_smoke_Pos | Add identity linked consent | 00:00:00 | |
| ESignet_AddIdentity_Linked_Sce_smoke_Pos | Add identity with valid parameters | 00:00:00 | |
| ESignet_AddIdentity_Password_Auth_smoke_Pos | Add identity with password authentication | 00:00:00 | |
| ESignet_AddIdentity_Valid_Parameters_Sce2_smoke_Pos | Add identity with all valid parameters | 00:00:00 | |
| ESignet_AddIdentity_Valid_Parameters_smoke_Pos | Add identity with all valid parameters | 00:00:02 | |
| ESignet_AddIdentity_Valid_Params_BindOtp_smoke_Pos | Add identity with all valid parameters | 00:00:00 | |
| ESignet_AddIdentity_Valid_Params_VCI_Vid_Inv_Scen_smoke_Pos | Add identity with valid parameters VCI Vid invalid scenario | 00:00:00 | |
| ESignet_AddIdentity_Valid_Params_VCI_Vid_smoke_Pos | Add identity with valid parameters VCI Vid | 00:00:00 | |
| ESignet_AddIdentity_Valid_Params_VCI_uin_Inv_Scen_smoke_Pos | Add identity with valid parameters VCI UIN invalid scenario | 00:00:00 | |
| ESignet_AddIdentity_Valid_Params_VCI_uin_smoke_Pos | Add identity with valid parameters VCI UIN | 00:00:00 | |
| ESignet_AddIdentity_Valid_Params_WOEmail_smoke_Pos | Add identity with valid parameter and without Email | 00:00:00 | |
| ESignet_AddIdentity_Valid_Params_WOPhone_smoke_Pos | Add identity with valid parameter and without phone number | 00:00:00 | |
| ESignet_AddIdentity_Vid_2_Generation_smoke_Pos | Add identity Vid generation | 00:00:00 | |
| ESignet_AddIdentity_Vid_Generation_smoke_Pos | Add identity Vid generation | 00:00:00 | |
| AddIdentity — Ignored | |||
| ESignet_AddIdentity_BioAuth_smoke_Pos | Add identity with BioAuth | 00:00:00 | |
| ESignet_AddIdentity_Consent_Vid_smoke_Pos | Add identity consent Vid | 00:00:00 | |
| ESignet_AddIdentity_Consent_smoke_Pos | Add identity consent | 00:00:00 | |
| ESignet_AddIdentity_Invalid_Scen_smoke_Pos | Add identity with invalid scenario | 00:00:00 | |
| ESignet_AddIdentity_KycAuth_smoke_Pos | Add identity with KycAuth | 00:00:00 | |
| ESignet_AddIdentity_L2_Valid_Parameters_smoke_Neg_Pos | 00:00:00 | ||
| ESignet_AddIdentity_L2_Valid_Parameters_smoke_Pos | 00:00:00 | ||
| ESignet_AddIdentity_Linked_Consent_User2_Vid_smoke_Pos | Add identity linked consent user2 Vid | 00:00:00 | |
| ESignet_AddIdentity_Linked_Consent_User2_smoke_Pos | Add identity linked consent user2 | 00:00:00 | |
| ESignet_AddIdentity_Linked_Consent_Vid_smoke_Pos | Add identity linked consent Vid | 00:00:00 | |
| ESignet_AddIdentity_Linked_Consent_smoke_Pos | Add identity linked consent | 00:00:00 | |
| ESignet_AddIdentity_Linked_Sce_smoke_Pos | Add identity with valid parameters | 00:00:00 | |
| ESignet_AddIdentity_Password_Auth_smoke_Pos | Add identity with password authentication | 00:00:00 | |
| ESignet_AddIdentity_Valid_Parameters_Sce2_smoke_Pos | Add identity with all valid parameters | 00:00:00 | |
| ESignet_AddIdentity_Valid_Parameters_smoke_Pos | Add identity with all valid parameters | 00:00:00 | |
| ESignet_AddIdentity_Valid_Params_BindOtp_smoke_Pos | Add identity with all valid parameters | 00:00:00 | |
| ESignet_AddIdentity_Valid_Params_VCI_Vid_Inv_Scen_smoke_Pos | Add identity with valid parameters VCI Vid invalid scenario | 00:00:00 | |
| ESignet_AddIdentity_Valid_Params_VCI_Vid_smoke_Pos | Add identity with valid parameters VCI Vid | 00:00:00 | |
| ESignet_AddIdentity_Valid_Params_VCI_uin_Inv_Scen_smoke_Pos | Add identity with valid parameters VCI UIN invalid scenario | 00:00:00 | |
| ESignet_AddIdentity_Valid_Params_VCI_uin_smoke_Pos | Add identity with valid parameters VCI UIN | 00:00:00 | |
| ESignet_AddIdentity_Valid_Params_WOEmail_smoke_Pos | Add identity with valid parameter and without Email | 00:00:00 | |
| ESignet_AddIdentity_Valid_Params_WOPhone_smoke_Pos | Add identity with valid parameter and without phone number | 00:00:00 | |
| ESignet_AddIdentity_Vid_2_Generation_smoke_Pos | Add identity Vid generation | 00:00:00 | |
| ESignet_AddIdentity_Vid_Generation_smoke_Pos | Add identity Vid generation | 00:00:00 | |
| CreatePolicyGroup — Ignored | |||
| Esignet_DefinePolicyGroup_All_Valid_Smoke_sid | Define policy group with all valid parameters | 00:00:00 | |
| Esignet_DefinePolicyGroup_Misp_Valid_Smoke_sid | Define policy group with valid Misp | 00:00:00 | |
| Esignet_DefinePolicyGroup_Valid_Smoke_sid | Define policy group with valid details | 00:00:00 | |
| Esignet_DefinePolicyGroup_in_Valid_Smoke_sid | Define policy group with valid details | 00:00:00 | |
| DefinePolicy — Ignored | |||
| Esignet_DefinePolicy_All_Valid_Smoke_sid | Define policy with all valid details | 00:00:00 | |
| Esignet_DefinePolicy_Auth_False_Valid_Smoke_sid | Define policy with Auth and isActive as false | 00:00:00 | |
| Esignet_DefinePolicy_Auth_S2_Valid_Smoke_sid | Define policy with Auth S2 | 00:00:00 | |
| Esignet_DefinePolicy_Auth_Valid_Smoke_sid | Define policy with Auth | 00:00:00 | |
| Esignet_DefinePolicy_Invalid_MispPolicy_Neg | Define policy with invalid MispPolicy | 00:00:00 | |
| Esignet_DefinePolicy_Invalid_PolicyAuth_Neg | Define policy with invalid policyAuth | 00:00:00 | |
| Esignet_DefinePolicy_Invalid_PolicyGroupName_Neg | Define policy with invalid policyGroupName | 00:00:00 | |
| Esignet_DefinePolicy_Invalid_PolicyType_Neg | Define policy with invalid policyType | 00:00:00 | |
| Esignet_DefinePolicy_Misp_False_Valid_Smoke_sid | Define policy with isActive as false | 00:00:00 | |
| Esignet_DefinePolicy_Misp_S2_Valid_Smoke_sid | Define policy with Misp S2 | 00:00:00 | |
| Esignet_DefinePolicy_Misp_Valid_Smoke_sid | Define policy with all valid details Misp | 00:00:00 | |
| Esignet_DefinePolicy_NonAuth_All_Valid_Smoke_sid | Define policy with NonAuth | 00:00:00 | |
| Esignet_DefinePolicy_With_1_Policy_All_Valid_Smoke_sid | Define policy with 1 policy valid details | 00:00:00 | |
| Esignet_DefinePolicy_With_2_Policy_All_Valid_Smoke_sid | Define policy with 2 policy valid details | 00:00:00 | |
| Esignet_DefinePolicy__Invalid_Misp_Name_Neg | Define policy with invalid Misp Name | 00:00:00 | |
| PublishPolicy — Ignored | |||
| Esignet_PublishPolicy_All_Valid_Smoke | Publish policy with all valid details | 00:00:00 | |
| Esignet_PublishPolicy_Auth_False_Valid_Smoke | Publish policy Auth false valid details | 00:00:00 | |
| Esignet_PublishPolicy_Auth_S2_Valid_Smoke | Publish policy Auth S2 valid details | 00:00:00 | |
| Esignet_PublishPolicy_Misp_False_Valid_Smoke | Publish policy Misp false valid details | 00:00:00 | |
| Esignet_PublishPolicy_Misp_S2_Valid_Smoke | Publish policy Misp S2 valid details | 00:00:00 | |
| Esignet_PublishPolicy_Misp_Valid_Smoke | Publish policy Misp with all valid details | 00:00:00 | |
| Esignet_PublishPolicy_NonAuth_All_Valid_Smoke | Publish policy with NonAuth valid details | 00:00:00 | |
| Esignet_PublishPolicy_Valid_Smoke | Publish policy with valid details | 00:00:00 | |
| CreatePartner — Ignored | |||
| Esignet_PartnerSelfRegistration_All_Valid_Smoke_sid | PartnerSelfRegistration with all valid details | 00:00:00 | |
| Esignet_PartnerSelfRegistration_Auth_False_Valid_Smoke_sid | PartnerSelfRegistration Auth false valid details | 00:00:00 | |
| Esignet_PartnerSelfRegistration_Auth_S2_Valid_Smoke_sid | PartnerSelfRegistration Auth S2 valid details | 00:00:00 | |
| Esignet_PartnerSelfRegistration_Kyc_Valid_Smoke_sid | PartnerSelfRegistration Kyc valid details | 00:00:00 | |
| Esignet_PartnerSelfRegistration_Misp_False_Valid_Smoke_sid | PartnerSelfRegistration Misp false valid details | 00:00:00 | |
| Esignet_PartnerSelfRegistration_Misp_S2_Valid_Smoke_sid | PartnerSelfRegistration Misp S2 valid details | 00:00:00 | |
| Esignet_PartnerSelfRegistration_Misp_Valid_Smoke_sid | PartnerSelfRegistration Misp valid details | 00:00:00 | |
| Esignet_PartnerSelfRegistration_NonAuth_All_Valid_Smoke_sid | PartnerSelfRegistration NonAuth all valid details | 00:00:00 | |
| UploadCACertificate — Ignored | |||
| Esignet_UploadCACertificate_All_Valid_Smoke | upload CACertificate with all valid details | 00:00:00 | |
| Esignet_UploadCACertificate_Auth_False_Valid_Smoke | upload CACertificate Auth false valid details | 00:00:00 | |
| Esignet_UploadCACertificate_Auth_S2_Valid_Smoke | upload CACertificate Auth S2 valid details | 00:00:00 | |
| Esignet_UploadCACertificate_Kyc_All_Valid_Smoke | upload CACertificate Kyc with all valid details | 00:00:00 | |
| Esignet_UploadCACertificate_Misp_False_Valid_Smoke | upload CACertificate Misp False valid details | 00:00:00 | |
| Esignet_UploadCACertificate_Misp_S2_Valid_Smoke | upload CACertificate Misp S2 valid details | 00:00:00 | |
| Esignet_UploadCACertificate_Misp_Valid_Smoke | upload CACertificate Misp valid details | 00:00:00 | |
| Esignet_UploadCACertificate_NonAuth_All_Valid_Smoke | upload CACertificate NonAuth with all valid details | 00:00:00 | |
| Esignet_UploadCInterCertificate_All_Valid_Smoke | upload CACertificate with all valid details | 00:00:00 | |
| Esignet_UploadCInterCertificate_Auth_False_Valid_Smoke | upload CACertificate Auth false valid details | 00:00:00 | |
| Esignet_UploadCInterCertificate_Auth_S2_Valid_Smoke | upload CACertificate Auth S2 valid details | 00:00:00 | |
| Esignet_UploadCInterCertificate_Kyc_All_Valid_Smoke | upload CACertificate Kyc with all valid details | 00:00:00 | |
| Esignet_UploadCInterCertificate_Misp_False_Valid_Smoke | upload CACertificate Misp false valid details | 00:00:00 | |
| Esignet_UploadCInterCertificate_Misp_S2_Valid_Smoke | upload CACertificate Misp S2 valid details | 00:00:00 | |
| Esignet_UploadCInterCertificate_Misp_Valid_Smoke | upload CACertificate Misp valid details | 00:00:00 | |
| Esignet_UploadCInterCertificate_NonAuth_All_Valid_Smoke | upload CACertificate NonAuth all valid details | 00:00:00 | |
| UploadPartnerCertificate — Ignored | |||
| Esignet_UploadPartnerCert_All_Valid_Smoke | Upload partner certificate with all valid details | 00:00:00 | |
| Esignet_UploadPartnerCert_Auth_False_Valid_Smoke | Upload partner certificate Auth false valid details | 00:00:00 | |
| Esignet_UploadPartnerCert_Auth_S2_Valid_Smoke | Upload partner certificate Auth S2 valid details | 00:00:00 | |
| Esignet_UploadPartnerCert_Kyc_All_Valid_Smoke | Upload partner certificate Kyc all valid details | 00:00:00 | |
| Esignet_UploadPartnerCert_Misp_False_Valid_Smoke | Upload partner certificate Misp false valid details | 00:00:00 | |
| Esignet_UploadPartnerCert_Misp_S2_Valid_Smoke | Upload partner certificate Misp S2 valid details | 00:00:00 | |
| Esignet_UploadPartnerCert_Misp_Valid_Smoke_sid | Upload partner certificate Misp valid details | 00:00:00 | |
| Esignet_UploadPartnerCert_NonAuth_All_Valid_Smoke | Upload partner certificate NonAuth all valid details | 00:00:00 | |
| updatePartnerCertificate — Ignored | |||
| ESignet_updatePartnerCertificate_StatusCode_AuthDemoUrl_All_Valid_Smoke | Update partner certificate statusCode AuthDemoUrl all valid details | 00:00:00 | |
| RequestAPIKeyForAuthPartner — Ignored | |||
| Esignet_SubmitPartnerApiKeyRequest_Kyc_Rejection_All_Valid_Smoke_sid | Submit partner Api Key request Kyc rejection all valid details | 00:00:00 | |
| Esignet_SubmitPartnerApiKeyRequest_Rejection_All_Valid_Smoke_sid | Submit partner Api Key request rejection all valid details | 00:00:00 | |
| Esignet_SubmitPartnerApiKeyRequest_Rejection_Auth_False_Valid_Smoke_sid | Submit partner Api Key request rejection Auth false valid details | 00:00:00 | |
| Esignet_SubmitPartnerApiKeyRequest_Rejection_Misp_False_Valid_Smoke_sid | Submit partner Api Key request rejection Misp false valid details | 00:00:00 | |
| Esignet_SubmitPartnerApiKeyRequest_Rejection_Misp_Valid_Smoke_sid | Submit partner Api Key request rejection Misp valid details | 00:00:00 | |
| Esignet_SubmitPartnerApiKeyRequest_Rejection_NonAuth_All_Valid_Smoke_sid | Submit partner Api Key request rejection NonAuth all valid details | 00:00:00 | |
| ApproveAPIKey — Ignored | |||
| Esignet_ApproveRejectPartnerAPIKeyReq_All_Valid_Smoke | Approve or Reject partner Api key request all valid details | 00:00:00 | |
| Esignet_ApproveRejectPartnerAPIKeyReq_Auth_False_Valid_Smoke | Approve or Reject partner Api key request Auth false valid details | 00:00:00 | |
| Esignet_ApproveRejectPartnerAPIKeyReq_Kyc_All_Valid_Smoke | Approve or Reject partner Api key request Kyc all valid details | 00:00:00 | |
| Esignet_ApproveRejectPartnerAPIKeyReq_Misp_False_Valid_Smoke | Approve or Reject partner Api key request Misp false valid details | 00:00:00 | |
| Esignet_ApproveRejectPartnerAPIKeyReq_Misp_Valid_Smoke | Approve or Reject partner Api key request Misp valid details | 00:00:00 | |
| Esignet_ApproveRejectPartnerAPIKeyReq_NonAuth_All_Valid_Smoke | Approve or Reject partner Api key request NonAuth all valid details | 00:00:00 | |
| UpdatePolicy — Ignored | |||
| Esignet_UpdatePolicy__AfterPublished_Neg | Update policy after published | 00:00:00 | |
| DeactivatePolicy — Ignored | |||
| Esignet_DeactivatePolicy_After_Publish_Neg | Deactivate policy after published | 00:00:00 | |
| GenerateMispLK — Ignored | |||
| Esignet_GenerateMispLK_All_Valid_Smoke_sid | Generate MispLk all valid details | 00:00:00 | |
| Esignet_GenerateMispLK_Misp_False_Valid_Smoke_sid | Generate MispLk Misp false valid details | 00:00:00 | |
| Esignet_GenerateMispLK_Misp_S2_Valid_Smoke_sid | Generate MispLk Misp S2 valid details | 00:00:00 | |
| GenerateApiKey — Ignored | |||
| ESignet_GenerateApiKeyKyc_Valid_Smoke_sid | Generate Api key Kyc valid details | 00:00:00 | |
| ESignet_GenerateApiKey_Valid_Smoke_sid | Generate Api key with valid details | 00:00:00 | |
| OIDCClient — Ignored | |||
| Esignet_CreateOIDCClient_Auth_False_Valid_Smoke_sid | Create OIDC client Auth false valid details | 00:00:00 | |
| Esignet_CreateOIDCClient_Auth_S2_Valid_Smoke_sid | Create OIDC client Auth S2 valid details | 00:00:00 | |
| Esignet_CreateOIDCClient_InValid_Partner_sid | Create OIDC client with invalid partner | 00:00:00 | |
| Esignet_CreateOIDCClient_InValid_logoUri_sid | Create OIDC client with invalid logoUri | 00:00:00 | |
| Esignet_CreateOIDCClient_Misp_Valid_Smoke_sid | Create OIDC client Misp valid details | 00:00:00 | |
| Esignet_CreateOIDCClient_NonAuth_all_Valid_Smoke_sid | Create OIDC client NonAuth all valid details | 00:00:00 | |
| Esignet_CreateOIDCClient_all_Valid_Smoke_sid | Create OIDC client with all valid details | 00:00:00 | |
| Esignet_CreateOIDCClient_blank_authPartnerId_sid | Create OIDC client blank authpartnerId | 00:00:00 | |
| Esignet_CreateOIDCClient_inValid_authPartnerId_sid | Create OIDC client with invalid authpartnerId | 00:00:00 | |
| Esignet_CreateOIDCClient_max_authPartnerId_Neg | Create OIDC client with exceeding maximum limit in authpartnerId | 00:00:00 | |
| Esignet_CreateOIDCClient_same_publickey_sid | Create OIDC client with same publicKey | 00:00:00 | |
| Esignet_CreateOIDCClient_with_empty_grantTypes_sid | Create OIDC client with empty grantTypes | 00:00:00 | |
| Esignet_CreateOIDCClient_with_invalid_clientAuthMethods_sid | Create OIDC client with invalid clientAuthMethods | 00:00:00 | |
| Esignet_CreateOIDCClient_with_invalid_grantTypes_sid | Create OIDC client with invalid grantTypes | 00:00:00 | |
| Esignet_CreateOIDCClient_with_invalid_policy_sid | Create OIDC client with invalid policy | 00:00:00 | |
| Esignet_CreateOIDCClient_with_maxm_char_logouri_sid | Create OIDC client with maximum character in logouri | 00:00:00 | |
| Esignet_CreateOIDCClient_with_null_grantTypes_sid | Create OIDC client with null grantTypes | 00:00:00 | |
| Esignet_CreateOIDCClient_with_null_oidc_sid | Create OIDC client with null oidc | 00:00:00 | |
| Esignet_CreateOIDCClient_with_null_policy_sid | Create OIDC client with null policy | 00:00:00 | |
| Esignet_CreateOIDCClient_without_redirecturi_sid | Create OIDC client without redirecturi | 00:00:00 | |
| OIDCClientUpdate — Ignored | |||
| Esignet_UpdateOIDC_Invalid_clientId_Neg | Update OIDC client with invalid clientId | 00:00:00 | |
| Esignet_UpdateOIDC_all_Valid_Smoke | Update OIDC client with all valid details | 00:00:00 | |
| GetOidcClient — Ignored | |||
| Esignet_GetOidcClient_Invalid_clientId_Neg | Get OIDC client with invalid clientId | 00:00:00 | |
| Esignet_GetOidcClient_all_Valid_Smoke | Get OIDC client with all valid details | 00:00:00 | |
| GenerateVID — Ignored | |||
| ESignetRes_Generate_Onetimeuse2_VID_Valid_Smoke_sid | Generate Onetimeuse2 VID valid details | 00:00:00 | |
| ESignetRes_Generate_Onetimeuse_VID_Invalid_Scen_Valid_Smoke_sid | Generate Onetimeuse VID invalid scen valid details | 00:00:00 | |
| ESignetRes_Generate_Onetimeuse_VID_Valid_Smoke_sid | Generate Onetimeuse VID with valid details | 00:00:00 | |
| ESignetRes_Generate_Perpetual2_VID_Valid_Smoke_sid | Generate perpetual2 VID with valid details | 00:00:00 | |
| ESignetRes_Generate_Perpetual_VID_Consent_Valid_Smoke_sid | Generate perpetual VID consent valid details | 00:00:00 | |
| ESignetRes_Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid | Generate perpetual VID with invalid scenario | 00:00:00 | |
| ESignetRes_Generate_Perpetual_VID_Kyc_Valid_Smoke_sid | Generate perpetual VID Kyc valid details | 00:00:00 | |
| ESignetRes_Generate_Perpetual_VID_LinkedSce_Valid_Smoke_sid | Generate perpetual VID Linkedsce valid details | 00:00:00 | |
| ESignetRes_Generate_Perpetual_VID_Linked_Consent_User2_Valid_Smoke_sid | Generate perpetual VID linked consent user2 valid details | 00:00:00 | |
| ESignetRes_Generate_Perpetual_VID_Linked_Consent_Valid_Smoke_sid | Generate perpetual VID linked consent valid details | 00:00:00 | |
| ESignetRes_Generate_Perpetual_VID_VCI_Invalid_Scen_Smoke_sid | Generate perpetual VID VCI with invalid scenario | 00:00:00 | |
| ESignetRes_Generate_Perpetual_VID_VCI_Valid_Smoke_sid | Generate perpetual VID VCI valid details | 00:00:00 | |
| ESignetRes_Generate_Perpetual_VID_Valid_Smoke_sid | Generate perpetual VID with all valid details | 00:00:00 | |
| ESignetRes_Generate_Temporary2_VID_Valid_Smoke_sid | Generate temporary2 VID valid details | 00:00:00 | |
| ESignetRes_Generate_Temporary_VID_Invalid_Scen_Valid_Smoke_sid | Generate temporary VID invalid scen valid details | 00:00:00 | |
| ESignetRes_Generate_Temporary_VID_Valid_Smoke_sid | Generate temporary VID with valid details | 00:00:00 | |
| OIDCClientV2 — Passed | |||
| ESignet_CreateOIDCClient_Misp_Valid_Smoke_sid | To create OIDC Client V2 with all valid data | 00:00:00 | |
| ESignet_CreateOIDCClient_NonAuth_all_Valid_Smoke_sid | To create OIDC Client V2 with all valid data | 00:00:01 | |
| ESignet_CreateOIDCClient_all_Valid_Smoke_sid | To create OIDC Client V2 with all valid data | 00:00:06 | |
| SendBindingOtp — Ignored | |||
| ESignet_SendBindingOtp_Vid_Empty_IndividualId_Neg | Send binding Otp VID with empty individualId | 00:00:00 | |
| ESignet_SendBindingOtp_Vid_Empty_OtpChannels_Neg | Send binding Otp VID with empty OtpChannels | 00:00:00 | |
| ESignet_SendBindingOtp_Vid_Future_RequestTime_Neg | Send binding Otp VID with future requestTime | 00:00:00 | |
| ESignet_SendBindingOtp_Vid_Invalid_Case_IndividualId_Neg | Send binding Otp VID with invalid case in individualId | 00:00:00 | |
| ESignet_SendBindingOtp_Vid_Invalid_OtpChannels_Neg | Send binding Otp VID with invalid OtpChannels | 00:00:00 | |
| ESignet_SendBindingOtp_Vid_Invalid_RequestTime_Neg | Send binding Otp VID with invalid requestTime | 00:00:00 | |
| ESignet_SendBindingOtp_Vid_Missing_IndividualId_Neg | Send binding Otp VID without individualId | 00:00:00 | |
| ESignet_SendBindingOtp_Vid_Missing_OtpChannels_Neg | Send binding Otp VID without OtpChannels | 00:00:00 | |
| ESignet_SendBindingOtp_Vid_Missing_RequestTime_Neg | Send binding Otp VID without requestTime | 00:00:00 | |
| ESignet_SendBindingOtp_Vid_Past_RequestTime_Neg | Send binding Otp VID with past requestTime | 00:00:00 | |
| ESignet_SendBindingOtp_Vid_Space_As_RequestTime_Neg | Send binding Otp VID with only space in requestTime | 00:00:00 | |
| ESignet_SendBindingOtp_Vid_Space_Sep_OtpChannels_Neg | Send binding Otp VID with space separated OtpChannels | 00:00:00 | |
| ESignet_SendBindingOtp_Vid_Valid_Smoke_sid | Send binding Otp for VID with valid details | 00:00:00 | |
| ESignet_SendBindingOtp_Vid_invalid_individual_id_Neg | Send binding Otp VID with invalid individualId | 00:00:00 | |
| ESignet_SendBindingOtp_uin_Email_Valid_Smoke_sid | Send binding Otp to email for UIN with valid details | 00:00:00 | |
| SendBindingOtp — Passed | |||
| ESignet_SendBindingOtp_uin_Empty_IndividualId_Neg | Send binding Otp UIN with empty individualId | 00:00:00 | |
| ESignet_SendBindingOtp_uin_Empty_OtpChannels_Neg | Send binding Otp UIN with empty OtpChannels | 00:00:00 | |
| ESignet_SendBindingOtp_uin_Future_RequestTime_Neg | Send binding Otp for UIN with future requestTime | 00:00:00 | |
| ESignet_SendBindingOtp_uin_Invalid_Case_IndividualId_Neg | Send binding Otp for UIN with invalid case in individualId | 00:00:00 | |
| ESignet_SendBindingOtp_uin_Invalid_OtpChannels_Neg | Send binding Otp UIN with invalid OtpChannels | 00:00:00 | |
| ESignet_SendBindingOtp_uin_Invalid_RequestTime_Neg | Send binding Otp for UIN with invalid requestTime | 00:00:00 | |
| ESignet_SendBindingOtp_uin_Missing_IndividualId_Neg | Send binding Otp UIN without individualId | 00:00:00 | |
| ESignet_SendBindingOtp_uin_Missing_OtpChannels_Neg | Send binding Otp UIN without OtpChannels | 00:00:00 | |
| ESignet_SendBindingOtp_uin_Missing_RequestTime_Neg | Send binding Otp for UIN without requestTime | 00:00:00 | |
| ESignet_SendBindingOtp_uin_NR_Email_IndividualId_Neg | Send binding Otp for UIN NR email for individualId | 00:00:00 | |
| ESignet_SendBindingOtp_uin_NR_Phone_IndividualId_Neg | Send binding Otp UIN NR phone for individualId | 00:00:00 | |
| ESignet_SendBindingOtp_uin_Past_RequestTime_Neg | Send binding Otp for UIN with past requestTime | 00:00:00 | |
| ESignet_SendBindingOtp_uin_Phone_Valid_Smoke_sid | Send binding Otp to phone for UIN with valid details | 00:00:00 | |
| ESignet_SendBindingOtp_uin_Space_As_RequestTime_Neg | Send binding Otp for UIN with space in requestTime | 00:00:00 | |
| ESignet_SendBindingOtp_uin_Space_Sep_OtpChannels_Neg | Send binding Otp UIN with space separated OtpChannels | 00:00:00 | |
| ESignet_SendBindingOtp_uin_all_Valid_Smoke_sid | Send binding Otp for UIN with all valid details | 00:00:00 | |
| ESignet_SendBindingOtp_uin_invalid_individual_id_Neg | Send binding Otp for UIN with invalid individualId | 00:00:00 | |
| WalletBinding — Ignored | |||
| ESignet_WalletBinding_Vid_EmptyVal_AuthFactorType_Neg | Wallet binding VID with empty value in AuthFactorType | 00:00:00 | |
| ESignet_WalletBinding_Vid_EmptyVal_Challenge_Neg | Wallet binding VID with empty value in challenge | 00:00:00 | |
| ESignet_WalletBinding_Vid_Empty_Formate_Neg | Wallet binding VID with empty format | 00:00:00 | |
| ESignet_WalletBinding_Vid_Empty_IndividualId_Neg | Wallet binding VID with empty individualId | 00:00:00 | |
| ESignet_WalletBinding_Vid_Empty_authFactorType1_Neg | Wallet binding VID with empty authFactorType1 | 00:00:00 | |
| ESignet_WalletBinding_Vid_Empty_format1_Neg | Wallet binding VID with empty format1 | 00:00:00 | |
| ESignet_WalletBinding_Vid_Future_RequestTime_Neg | Wallet binding VID with future requestTime | 00:00:00 | |
| ESignet_WalletBinding_Vid_Invalid_AuthFactorType_Neg | Wallet binding VID with invalid authFactorType | 00:00:00 | |
| ESignet_WalletBinding_Vid_Invalid_Challenge_Neg | Wallet binding VID with invalid challenge | 00:00:00 | |
| ESignet_WalletBinding_Vid_Invalid_Formate_Neg | Wallet binding VID with invalid format | 00:00:00 | |
| ESignet_WalletBinding_Vid_Invalid_IndividualId_Neg | Wallet binding VID with invalid individualId | 00:00:00 | |
| ESignet_WalletBinding_Vid_Invalid_RequestTime_Neg | Wallet binding VID with invalid requestTime | 00:00:00 | |
| ESignet_WalletBinding_Vid_Invalid_authFactorType1_Neg | Wallet binding VID with invalid authFactorType1 | 00:00:00 | |
| ESignet_WalletBinding_Vid_Invalid_format1_Neg | Wallet binding VID with invalid format1 | 00:00:00 | |
| ESignet_WalletBinding_Vid_Invalid_publicKey_Neg | Wallet binding VID with invalid publicKey | 00:00:00 | |
| ESignet_WalletBinding_Vid_Missing_AuthFactorType_Neg | Wallet binding VID without AuthFactorType | 00:00:00 | |
| ESignet_WalletBinding_Vid_Missing_Challenge_Neg | Wallet binding VID without challenge | 00:00:00 | |
| ESignet_WalletBinding_Vid_Missing_Formate_Neg | Wallet binding VID without format | 00:00:00 | |
| ESignet_WalletBinding_Vid_Missing_IndividualId_Neg | Wallet binding VID without individualId | 00:00:00 | |
| ESignet_WalletBinding_Vid_Missing_authFactorType1_Neg | Wallet binding VID without authFactorType1 | 00:00:00 | |
| ESignet_WalletBinding_Vid_Missing_format1_Neg | Wallet binding VID without format1 | 00:00:00 | |
| ESignet_WalletBinding_Vid_Null_IndividualId_Neg | Wallet binding VID with Null in individualId | 00:00:00 | |
| ESignet_WalletBinding_Vid_Null_publicKey_Neg | Wallet binding VID with Null in publicKey | 00:00:00 | |
| ESignet_WalletBinding_Vid_OTP_Valid_Smoke | Wallet binding VID with valid details | 00:00:00 | |
| ESignet_WalletBinding_Vid_PastVal_RequestTime_Neg | Wallet binding VID with past value in requestTime | 00:00:00 | |
| ESignet_WalletBinding_Vid_SpaceVal_AuthFactorType_Neg | Wallet binding VID with space in AuthFactorType | 00:00:00 | |
| ESignet_WalletBinding_Vid_SpaceVal_Challenge_Neg | Wallet binding VID with space in challenge | 00:00:00 | |
| ESignet_WalletBinding_Vid_SpaceVal_Formate_Neg | Wallet binding VID with space in format | 00:00:00 | |
| ESignet_WalletBinding_Vid_SpaceVal_IndividualId_Neg | Wallet binding VID with space in individualId | 00:00:00 | |
| ESignet_WalletBinding_Vid_SpaceVal_authFactorType1_Neg | Wallet binding VID with space in authFactorType1 | 00:00:00 | |
| ESignet_WalletBinding_Vid_SpaceVal_format1_Neg | Wallet binding VID with space in format1 | 00:00:00 | |
| WalletBinding — Passed | |||
| ESignet_WalletBinding_uin_EmptyVal_AuthFactorType_Neg | Wallet binding UIN with empty value in AuthFactorType | 00:00:00 | |
| ESignet_WalletBinding_uin_EmptyVal_Challenge_Neg | Wallet binding UIN with empty value in challenge | 00:00:01 | |
| ESignet_WalletBinding_uin_Empty_Formate_Neg | Wallet binding UIN with empty format | 00:00:00 | |
| ESignet_WalletBinding_uin_Empty_IndividualId_Neg | Wallet binding UIN with empty individualId | 00:00:00 | |
| ESignet_WalletBinding_uin_Empty_authFactorType1_Neg | Wallet binding UIN with empty authFactorType1 | 00:00:00 | |
| ESignet_WalletBinding_uin_Empty_format1_Neg | Wallet binding UIN with empty format1 | 00:00:00 | |
| ESignet_WalletBinding_uin_Future_RequestTime_Neg | Wallet binding UIN with future requestTime | 00:00:00 | |
| ESignet_WalletBinding_uin_Invalid_AuthFactorType_Neg | Wallet binding UIN with invalid AuthFactorType | 00:00:00 | |
| ESignet_WalletBinding_uin_Invalid_Challenge_Neg | Wallet binding UIN with invalid challenge | 00:00:01 | |
| ESignet_WalletBinding_uin_Invalid_Formate_Neg | Wallet binding UIN with invalid format | 00:00:00 | |
| ESignet_WalletBinding_uin_Invalid_IndividualId_Neg | Wallet binding UIN with invalid individualId | 00:00:01 | |
| ESignet_WalletBinding_uin_Invalid_RequestTime_Neg | Wallet binding UIN with invalid requestTime | 00:00:01 | |
| ESignet_WalletBinding_uin_Invalid_authFactorType1_Neg | Wallet binding UIN with invalid authFactorType1 | 00:00:00 | |
| ESignet_WalletBinding_uin_Invalid_format1_Neg | Wallet binding UIN with invalid format1 | 00:00:00 | |
| ESignet_WalletBinding_uin_Invalid_publicKey_Neg | Wallet binding UIN with invalid publicKey | 00:00:00 | |
| ESignet_WalletBinding_uin_Missing_AuthFactorType_Neg | Wallet binding UIN with missing AuthFactorType | 00:00:00 | |
| ESignet_WalletBinding_uin_Missing_Challenge_Neg | Wallet binding UIN with missing challenge | 00:00:00 | |
| ESignet_WalletBinding_uin_Missing_Formate_Neg | Wallet binding UIN with missing format | 00:00:00 | |
| ESignet_WalletBinding_uin_Missing_IndividualId_Neg | Wallet binding UIN without individualId | 00:00:01 | |
| ESignet_WalletBinding_uin_Missing_authFactorType1_Neg | Wallet binding UIN with missing authFactorType1 | 00:00:00 | |
| ESignet_WalletBinding_uin_Missing_format1_Neg | Wallet binding UIN without format1 | 00:00:00 | |
| ESignet_WalletBinding_uin_Null_IndividualId_Neg | Wallet binding UIN with Null in individualId | 00:00:01 | |
| ESignet_WalletBinding_uin_Null_publicKey_Neg | Wallet binding UIN with Null in publicKey | 00:00:00 | |
| ESignet_WalletBinding_uin_OTP_Email_Valid_Smoke | Wallet binding UIN with Otp email | 00:00:01 | |
| ESignet_WalletBinding_uin_OTP_Phone_Valid_Smoke | Wallet binding UIN with Otp phone | 00:00:01 | |
| ESignet_WalletBinding_uin_OTP_Valid_Smoke | Wallet binding UIN with valid details | 00:00:02 | |
| ESignet_WalletBinding_uin_PastVal_RequestTime_Neg | Wallet binding UIN with past value in requestTime | 00:00:01 | |
| ESignet_WalletBinding_uin_SpaceVal_AuthFactorType_Neg | Wallet binding UIN with space in AuthFactorType | 00:00:01 | |
| ESignet_WalletBinding_uin_SpaceVal_Challenge_Neg | Wallet binding UIN with space in challenge | 00:00:00 | |
| ESignet_WalletBinding_uin_SpaceVal_Formate_Neg | Wallet binding UIN with space in format | 00:00:00 | |
| ESignet_WalletBinding_uin_SpaceVal_IndividualId_Neg | Wallet binding UIN with space in individualId | 00:00:00 | |
| ESignet_WalletBinding_uin_SpaceVal_authFactorType1_Neg | Wallet binding UIN with space in authFactorType1 | 00:00:00 | |
| ESignet_WalletBinding_uin_SpaceVal_format1_Neg | Wallet binding UIN with space in format1 | 00:00:01 | |
| OAuthDetailsRequestLinkedConsent — Passed | |||
| ESignet_OAuthDetailsRequest_LinkAuth_Consent_EmptyClaim_Valid_Smoke_sid | Oauthdetails request with linkAuth consent and empty claim | 00:00:00 | |
| ESignet_OAuthDetailsRequest_LinkAuth_Consent_NoClaim_Neg | Oauthdetails request with linkAuth consent and no claims | 00:00:00 | |
| ESignet_OAuthDetailsRequest_LinkAuth_Consent_Valid_Smoke_sid | Oauthdetails request with linkAuth consent valid details | 00:00:00 | |
| ESignet_OAuthDetailsRequest_LinkAuth_Consent_vid_Valid_Smoke_sid | Oauthdetails request with linkAuth consent valid details | 00:00:00 | |
| GenerateLinkCodeConsent — Ignored | |||
| ESignet_GenerateLinkCode_Consent_Vid_all_Valid_Smoke_sid | Generate LinkCode consent VID with all valid details | 00:00:00 | |
| GenerateLinkCodeConsent — Passed | |||
| ESignet_GenerateLinkCode_Consent_uin_EmptyClaim_all_Valid_Smoke_sid | Generate LinkCode consent UIN with empty claim all valid details | 00:00:00 | |
| ESignet_GenerateLinkCode_Consent_uin_all_Valid_Smoke_sid | Generate LinkCode consent UIN with all valid details | 00:00:00 | |
| LinkTransactionConsent — Ignored | |||
| ESignet_LinkTransaction_Consent_Vid_all_Valid_Smoke_sid | Link transaction consent VID with all valid details | 00:00:00 | |
| LinkTransactionConsent — Passed | |||
| ESignet_LinkTransaction_Consent_uin_EmptyClaim_all_Valid_Smoke_sid | Link transaction consent UIN with empty claim | 00:00:00 | |
| ESignet_LinkTransaction_Consent_uin_all_Valid_Smoke_sid | Link transaction consent UIN with all valid details | 00:00:00 | |
| GetLinkStatusConsent — Ignored | |||
| ESignet_GetLinkStatus_Consent_Vid_all_Valid_Smoke | Get link status consent VID with all valid details | 00:00:00 | |
| GetLinkStatusConsent — Passed | |||
| ESignet_GetLinkStatus_Consent_uin_EmptyClaim_all_Valid_Smoke | Get link status consent UIN with empty claim | 00:00:00 | |
| ESignet_GetLinkStatus_Consent_uin_all_Valid_Smoke | Get link status consent UIN with all valid details | 00:00:00 | |
| LinkedAuthenticationConsentWla — Ignored | |||
| ESignet_LinkedAuthenticationWla_ConsentVid_SCert_all_Valid_Smoke_sid | LinkedAuthenticationWla consent VID SCert with all valid details | 00:00:00 | |
| LinkedAuthenticationConsentWla — Passed | |||
| ESignet_LinkedAuthenticationWla_Consent_EmptyClaim_uin_SCert_all_Valid_Smoke_sid | LinkedAuthenticationWla consent UIN with empty claim | 00:00:01 | |
| ESignet_LinkedAuthenticationWla_Consentuin_SCert_all_Valid_Smoke_sid | LinkedAuthenticationWla consent UIN SCert with all valid details | 00:00:01 | |
| LinkAuthorizationConsent — Ignored | |||
| ESignet_LinkedAuthorizationConsent_Consent_Vid_All_Valid_Smoke_sid | Linked Authorization conset VID with all valid details | 00:00:00 | |
| LinkAuthorizationConsent — Passed | |||
| ESignet_LinkedAuthorizationConsent_Consent_uin_All_Valid_Smoke_sid | Linked Authorization conset UIN with all valid details | 00:00:00 | |
| LinkAuthorizationCodeConsent — Ignored | |||
| ESignet_LinkAuthorizationCode_Consent_Vid_all_Valid_Smoke_sid | Link Authorization code consent VID with all valid details | 00:00:00 | |
| LinkAuthorizationCodeConsent — Passed | |||
| ESignet_LinkAuthorizationCode_Consent_uin_all_Valid_Smoke_sid | Link Authorization code consent UIN with all valid details | 00:00:00 | |
| GenerateTokenLinkedConsent — Ignored | |||
| ESignet_GenerateToken_LinkedConsent_Vid_Valid_Smoke_sid | Generate Token linkedConsent VID with all valid details | 00:00:00 | |
| GenerateTokenLinkedConsent — Passed | |||
| ESignet_GenerateToken_LinkedConsent_uin_Valid_Smoke_sid | Generate Token linkedConsent UIN with all valid details | 00:00:00 | |
| GetOidcUserInfoLinkedConsent — Ignored | |||
| ESignet_GetOidcUserInfo_LinkedConsent_Vid_IdpAccessToken_StatusCode_Valid_Smoke_sid | Get OIDC user info for linked consent VID with all valid details | 00:00:00 | |
| GetOidcUserInfoLinkedConsent — Passed | |||
| ESignet_GetOidcUserInfo_LinkedConsent_uin_IdpAccessToken_StatusCode_Valid_Smoke_sid | Get OIDC user info for linked consent UIN with all valid details | 00:00:00 | |
| OAuthDetailsRequestLinked — Ignored | |||
| ESignet_OAuthDetailsRequest_LinkAuth_Consent_SameClaim_Vid_Valid_Smoke_sid | Oauthdetails request linkAuth consent with same claim details VID | 00:00:00 | |
| ESignet_OAuthDetailsRequest_LinkAuth_Consent_User2_Vid_Valid_Smoke_sid | Oauthdetails request linkAuth consent User2 VID with valid details | 00:00:00 | |
| ESignet_OAuthDetailsRequest_LinkAuth_Vid_Valid_Smoke_sid | Oauthdetails request linkAuth VID with all valid details | 00:00:00 | |
| OAuthDetailsRequestLinked — Passed | |||
| ESignet_OAuthDetailsRequest_LinkAuth_Consent_SameClaim_Uin_Valid_Smoke_sid | Oauthdetails request linkAuth consent with same claim details UIN | 00:00:00 | |
| ESignet_OAuthDetailsRequest_LinkAuth_Consent_User2_Uin_Valid_Smoke_sid | Oauthdetails request linkAuth consent User2 UIN with valid details | 00:00:00 | |
| ESignet_OAuthDetailsRequest_LinkAuth_Other_Valid_Smoke_sid | Oauthdetails request other linkAuth with valid details | 00:00:00 | |
| ESignet_OAuthDetailsRequest_LinkAuth_Valid_Smoke_sid | Oauthdetails request linkAuth with all valid details | 00:00:00 | |
| GenerateLinkCode — Ignored | |||
| ESignet_GenerateLinkCode_Consent_Vid_SameClaim_all_Valid_Smoke_sid | Generate link code consent VID with same claim details | 00:00:00 | |
| ESignet_GenerateLinkCode_Consent_Vid_User2_all_Valid_Smoke_sid | Generate link code consent VID user2 with all valid details | 00:00:00 | |
| ESignet_GenerateLinkCode_Vid_all_Valid_Smoke_sid | Generate link code with all valid details VID | 00:00:00 | |
| GenerateLinkCode — Passed | |||
| ESignet_GenerateLinkCode_Consent_uin_SameClaim_all_Valid_Smoke_sid | Generate link code consent UIN with same claim details | 00:00:00 | |
| ESignet_GenerateLinkCode_Consent_uin_User2_all_Valid_Smoke_sid | Generate link code consent UIN user2 with all valid details | 00:00:00 | |
| ESignet_GenerateLinkCode_Empty_transactionId_Neg | Generate link code with empty transactionId | 00:00:00 | |
| ESignet_GenerateLinkCode_Expired_transactionId_Neg | Generate link code with expired transactionId | 00:00:00 | |
| ESignet_GenerateLinkCode_Future_RequestTime_Neg | Generate link code with future requestTime | 00:00:00 | |
| ESignet_GenerateLinkCode_Invalid_RequestTime_Neg | Generate link code with invalid requestTime | 00:00:00 | |
| ESignet_GenerateLinkCode_Invalid_transactionId_Neg | Generate link code with invalid transactionId | 00:00:00 | |
| ESignet_GenerateLinkCode_Missing_RequestTime_Neg | Generate link code without requestTime | 00:00:00 | |
| ESignet_GenerateLinkCode_Missing_transactionId_Neg | Generate link code without transactionId | 00:00:00 | |
| ESignet_GenerateLinkCode_Null_transactionId_Neg | Generate link code with Null in transactionId | 00:00:00 | |
| ESignet_GenerateLinkCode_Past_RequestTime_Neg | Generate link code with past requestTime | 00:00:00 | |
| ESignet_GenerateLinkCode_Space_As_RequestTime_Neg | Generate link code with only space in requestTime | 00:00:00 | |
| ESignet_GenerateLinkCode_all_Valid_Smoke_sid | Generate link code with all valid details | 00:00:00 | |
| LinkTransaction — Ignored | |||
| ESignet_LinkTransaction_Consent_Vid_SameClaim_all_Valid_Smoke_sid | link transaction consent VID with same claim and all valid details | 00:00:00 | |
| ESignet_LinkTransaction_Consent_Vid_User2_all_Valid_Smoke_sid | link transaction consent VID User2 with all valid details | 00:00:00 | |
| ESignet_LinkTransaction_Vid_all_Valid_Smoke_sid | link transaction VID with all valid details | 00:00:00 | |
| LinkTransaction — Passed | |||
| ESignet_LinkTransaction_Absent_RequestTime_Neg | link transaction without requestTime | 00:00:00 | |
| ESignet_LinkTransaction_Consent_uin_SameClaim_all_Valid_Smoke_sid | link transaction consent UIN with same claim and all valid details | 00:00:00 | |
| ESignet_LinkTransaction_Consent_uin_User2_all_Valid_Smoke_sid | link transaction consent UIN User2 with all valid details | 00:00:00 | |
| ESignet_LinkTransaction_Empty_LinkCode_Neg | link transaction with empty value in linkCode | 00:00:00 | |
| ESignet_LinkTransaction_Empty_RequestTime_Neg | link transaction with empty value in requestTime | 00:00:00 | |
| ESignet_LinkTransaction_Expired_LinkCode_Neg | link transaction with expired linkCode | 00:00:00 | |
| ESignet_LinkTransaction_Invalid_LinkCode_Neg | link transaction with invalid linkCode | 00:00:00 | |
| ESignet_LinkTransaction_Invalid_RequestTime_Neg | link transaction with invalid requestTime | 00:00:00 | |
| ESignet_LinkTransaction_Missing_val_LinkCode_Neg | link transaction without linkCode | 00:00:00 | |
| ESignet_LinkTransaction_Null_LinkCode_Neg | link transaction with Null in linkCode | 00:00:00 | |
| ESignet_LinkTransaction_RequestTime_FutureValue_Neg | link transaction with future value in requestTime | 00:00:00 | |
| ESignet_LinkTransaction_RequestTime_PastValue_Neg | link transaction with past value in requestTime | 00:00:00 | |
| ESignet_LinkTransaction_Space_Val_RequestTime_Neg | link transaction with only space in requestTime | 00:00:00 | |
| ESignet_LinkTransaction_all_Valid_Smoke_sid | link transaction with all valid details | 00:00:00 | |
| GetLinkStatus — Ignored | |||
| ESignet_GetLinkStatus_Consent_Vid_SameClaim_all_Valid_Smoke | Get link status consent UIN with same claim and all valid details | 00:00:00 | |
| ESignet_GetLinkStatus_Consent_Vid_User2_all_Valid_Smoke | Get link status consent VID User2 with all valid details | 00:00:00 | |
| ESignet_GetLinkStatus_Vid_all_Valid_Smoke | Get link status with all valid details VID | 00:00:00 | |
| GetLinkStatus — Passed | |||
| ESignet_GetLinkStatus_Consent_uin_SameClaim_all_Valid_Smoke | Get link status consent UIN with same claim and all valid details | 00:00:00 | |
| ESignet_GetLinkStatus_Consent_uin_User2_all_Valid_Smoke | Get link status consent UIN User2 with all valid details | 00:00:00 | |
| ESignet_GetLinkStatus_Empty_LinkCode_Neg | Get link status with empty linkCode | 00:00:00 | |
| ESignet_GetLinkStatus_Empty_TransactionId_Neg | Get link status with empty transactionId | 00:00:00 | |
| ESignet_GetLinkStatus_Expired_LinkCode_Neg | Get link status with expired linkCode | 00:00:26 | |
| ESignet_GetLinkStatus_Expired_TransactionId_Neg | Get link status with expired transactionId | 00:00:26 | |
| ESignet_GetLinkStatus_Future_RequestTime_Neg | Get link status with future value in requestTime | 00:00:00 | |
| ESignet_GetLinkStatus_Invalid_LinkCode_Neg | Get link status with invalid linkCode | 00:00:25 | |
| ESignet_GetLinkStatus_Invalid_RequestTime_Neg | Get link status with invalid requestTime | 00:00:00 | |
| ESignet_GetLinkStatus_Invalid_TransactionId_Neg | Get link status with invalid transactionId | 00:00:25 | |
| ESignet_GetLinkStatus_Missing_LinkCode_Neg | Get link status without linkCode | 00:00:00 | |
| ESignet_GetLinkStatus_Missing_RequestTime_Neg | Get link status without requestTime | 00:00:00 | |
| ESignet_GetLinkStatus_Missing_TransactionId_Neg | Get link status without transactionId | 00:00:00 | |
| ESignet_GetLinkStatus_Null_LinkCode_Neg | Get link status with Null in linkCode | 00:00:25 | |
| ESignet_GetLinkStatus_Null_TransactionId_Neg | Get link status with Null in transactionId | 00:00:25 | |
| ESignet_GetLinkStatus_Past_RequestTime_Neg | Get link status with past value in requestTime | 00:00:00 | |
| ESignet_GetLinkStatus_SpaceVal_LinkCode_Neg | Get link status with space in linkCode | 00:00:00 | |
| ESignet_GetLinkStatus_SpaceVal_RequestTime_Neg | Get link status with only space in requestTime | 00:00:00 | |
| ESignet_GetLinkStatus_SpaceVal_TransactionId_Neg | Get link status with only space in transactionId | 00:00:00 | |
| ESignet_GetLinkStatus_all_Valid_Smoke | Get link status with all valid details | 00:00:00 | |
| LinkedAuthenticationWla — Ignored | |||
| ESignet_LinkedAuthenticationWla_Consent_SameClaim_Vid_SCert_all_Valid_Smoke_sid | Linked AuthenticationWla consent same claim VID SCert all valid details | 00:00:00 | |
| ESignet_LinkedAuthenticationWla_Consent_User2_Vid_SCert_all_Valid_Smoke_sid | Linked AuthenticationWla consent User2 UIN SCert all valid details | 00:00:00 | |
| ESignet_LinkedAuthenticationWla_Vid_SCert_all_Valid_Smoke_sid | Linked AuthenticationWla VID SCert all valid details | 00:00:00 | |
| LinkedAuthenticationWla — Passed | |||
| ESignet_LinkedAuthenticationWla_Consent_SameClaim_uin_SCert_all_Valid_Smoke_sid | Linked AuthenticationWla consent same claim UIN SCert all valid details | 00:00:01 | |
| ESignet_LinkedAuthenticationWla_Consent_User2_uin_SCert_all_Valid_Smoke_sid | Linked AuthenticationWla consent User2 UIN SCert all valid details | 00:00:00 | |
| ESignet_LinkedAuthenticationWla_uin_SCert_all_Valid_Smoke_sid | Linked AuthenticationWla UIN SCert all valid details | 00:00:01 | |
| LinkedAuthorizationConsent — Ignored | |||
| ESignet_LinkedAuthorizationConsent_Consent_Vid_SameClaim_Pos | Linked authorization consent with same claim VID | 00:00:00 | |
| ESignet_LinkedAuthorizationConsent_Consent_Vid_User2 | Linked authorization consent with User2 VID | 00:00:00 | |
| ESignet_LinkedAuthorizationConsent_Vid_All_Valid_Smoke_sid | Linked authorization consent with all valid details VID | 00:00:00 | |
| LinkedAuthorizationConsent — Passed | |||
| ESignet_LinkedAuthorizationConsent_All_Valid_Smoke_sid | Linked authorization consent with all valid details | 00:00:00 | |
| ESignet_LinkedAuthorizationConsent_Consent_uin_SameClaim_Pos | Linked authorization consent with same claim UIN | 00:00:00 | |
| ESignet_LinkedAuthorizationConsent_Consent_uin_User2 | Linked authorization consent with User2 UIN | 00:00:00 | |
| ESignet_LinkedAuthorizationConsent_Empty_TransactionId_Neg | Linked authorization consent with empty transactionId | 00:00:00 | |
| ESignet_LinkedAuthorizationConsent_Empty_Val_RequestTime_Neg | Linked authorization consent with empty value in requestTime | 00:00:00 | |
| ESignet_LinkedAuthorizationConsent_Future_Val_RequestTime_Neg | Linked authorization consent with future value in requestTime | 00:00:00 | |
| ESignet_LinkedAuthorizationConsent_Invalid_AcceptedClaims_Neg | Linked authorization consent with invalid accepted claims | 00:00:00 | |
| ESignet_LinkedAuthorizationConsent_Invalid_RequestTime_Neg | Linked authorization consent with invalid requestTime | 00:00:00 | |
| ESignet_LinkedAuthorizationConsent_Invalid_TransactionId_Neg | Linked authorization consent with invalid transactionId | 00:00:00 | |
| ESignet_LinkedAuthorizationConsent_Invalid_permittedAuthorizeScopes_Neg | Linked authorization consent with invalid accepted claims | 00:00:00 | |
| ESignet_LinkedAuthorizationConsent_Missing_TransactionId_Neg | Linked authorization consent without transactionId | 00:00:00 | |
| ESignet_LinkedAuthorizationConsent_Null_AcceptedClaims_Neg | Linked authorization consent with Null in accepted claims | 00:00:00 | |
| ESignet_LinkedAuthorizationConsent_Null_permittedAuthorizeScopes_Neg | Linked authorization consent with Null in permittedAuthorizeScopes | 00:00:00 | |
| ESignet_LinkedAuthorizationConsent_Past_Val_RequestTime_Neg | Linked authorization consent with past value in requestTime | 00:00:00 | |
| ESignet_LinkedAuthorizationConsent_Space_Val_RequestTime_Neg | Linked authorization consent with only space in requestTime | 00:00:00 | |
| ESignet_LinkedAuthorizationConsent_Space_Val_TransactionId_Neg | Linked authorization consent with space in transactionId | 00:00:00 | |
| LinkAuthorizationCode — Ignored | |||
| ESignet_LinkAuthorizationCode_Consent_Vid_SameClaim_all_Valid_Smoke_sid | Link Authorization code consent VID with same claim and all valid details | 00:00:00 | |
| ESignet_LinkAuthorizationCode_Consent_Vid_User2_all_Valid_Smoke_sid | Link Authorization code consent VID for User2 with all valid details | 00:00:00 | |
| ESignet_LinkAuthorizationCode_Vid_all_Valid_Smoke_sid | Link Authorization code with all valid details VID | 00:00:00 | |
| LinkAuthorizationCode — Passed | |||
| ESignet_LinkAuthorizationCode_Consent_uin_SameClaim_all_Valid_Smoke_sid | Link Authorization code consent UIN with same claim and all valid details | 00:00:00 | |
| ESignet_LinkAuthorizationCode_Consent_uin_User2_all_Valid_Smoke_sid | Link Authorization code consent UIN for User2 with all valid details | 00:00:00 | |
| ESignet_LinkAuthorizationCode_Empty_TransactionId_Neg | Link Authorization code with empty value in transactionId | 00:00:00 | |
| ESignet_LinkAuthorizationCode_Empty_Val_linkedCode_Neg | Link Authorization code with empty value in linkedCode | 00:00:00 | |
| ESignet_LinkAuthorizationCode_Empty_Val_requestTime_Neg | Link Authorization code with empty value in requestTime | 00:00:00 | |
| ESignet_LinkAuthorizationCode_Future_Val_requestTime_Neg | Link Authorization code with future value requestTime | 00:00:00 | |
| ESignet_LinkAuthorizationCode_Invalid_TransactionId_Neg | Link Authorization code with invalid transactionId | 00:00:25 | |
| ESignet_LinkAuthorizationCode_Invalid_linkedCode_Neg | Link Authorization code with invalid linkedCode | 00:00:25 | |
| ESignet_LinkAuthorizationCode_Invalid_requestTime_Neg | Link Authorization code with invalid requestTime | 00:00:00 | |
| ESignet_LinkAuthorizationCode_Missing_Val_TransactionId_Neg | Link Authorization code without transactionId | 00:00:00 | |
| ESignet_LinkAuthorizationCode_Misssing_linkedCode_Neg | Link Authorization code without linkedCode | 00:00:00 | |
| ESignet_LinkAuthorizationCode_Past_Val_requestTime_Neg | Link Authorization code with past value in requestTime | 00:00:00 | |
| ESignet_LinkAuthorizationCode_Space_Val_TransactionId_Neg | Link Authorization code with only space in transactionId | 00:00:00 | |
| ESignet_LinkAuthorizationCode_Space_Val_linkedCode_Neg | Link Authorization code with only space in linkedCode | 00:00:00 | |
| ESignet_LinkAuthorizationCode_Space_Val_requestTime_Neg | Link Authorization code with only space in requestTime | 00:00:00 | |
| ESignet_LinkAuthorizationCode_all_Valid_Smoke_sid | Link Authorization code with all valid details | 00:00:00 | |
| GenerateTokenLinked — Ignored | |||
| ESignet_GenerateToken_Linked_Vid_SameClaim_all_Valid_Smoke_sid | Generate token linked VID with same claim and all valid details | 00:00:00 | |
| ESignet_GenerateToken_Linked_Vid_User2_all_Valid_Smoke_sid | Generate token linked VID for User2 with all valid details | 00:00:00 | |
| ESignet_GenerateToken_Linked_Vid_Valid_Smoke_sid | Generate token linked VID with all valid details | 00:00:00 | |
| GenerateTokenLinked — Passed | |||
| ESignet_GenerateToken_Linked_uin_SameClaim_all_Valid_Smoke_sid | Generate token linked UIN with same claim and all valid details | 00:00:00 | |
| ESignet_GenerateToken_Linked_uin_User2_all_Valid_Smoke_sid | Generate token linked UIN for User2 with all valid details | 00:00:00 | |
| ESignet_GenerateToken_Linked_uin_Valid_Smoke_sid | Generate token linked UIN with all valid details | 00:00:00 | |
| GetOidcUserInfoLinked — Ignored | |||
| ESignet_GetOidcUserInfo_Linked_Vid_IdpAccessToken_StatusCode_SameClaim_Valid_Smoke_sid | Get OIDC user info linked VID with same claim and all valid details | 00:00:00 | |
| ESignet_GetOidcUserInfo_Linked_Vid_IdpAccessToken_StatusCode_User2_Valid_Smoke_sid | Get OIDC user info linked VID for user2 with all valid details | 00:00:00 | |
| ESignet_GetOidcUserInfo_Linked_Vid_IdpAccessToken_StatusCode_Valid_Smoke_sid | Get OIDC user info linked VID with all valid details | 00:00:00 | |
| GetOidcUserInfoLinked — Passed | |||
| ESignet_GetOidcUserInfo_Linked_uin_IdpAccessToken_StatusCode_SameClaim_Valid_Smoke_sid | Get OIDC user info linked UIN with same claim and all valid details | 00:00:00 | |
| ESignet_GetOidcUserInfo_Linked_uin_IdpAccessToken_StatusCode_User2_Valid_Smoke_sid | Get OIDC user info linked UIN for user2 with all valid details | 00:00:00 | |
| ESignet_GetOidcUserInfo_Linked_uin_IdpAccessToken_StatusCode_Valid_Smoke_sid | Get OIDC user info linked UIN with all valid details | 00:00:00 | |
| OAuthDetailsRequestNonAuth — Ignored | |||
| ESignet_OAuthDetailsRequest_NonAuth_BioFace_Vid_all_Valid_Smoke_sid | Oauthdetails request with NonAuth BioFace and all valid details VID | 00:00:00 | |
| ESignet_OAuthDetailsRequest_NonAuth_LeftIris_Vid_all_Valid_Smoke_sid | Oauthdetails request with NonAuth LeftIris and all valid details VID | 00:00:00 | |
| ESignet_OAuthDetailsRequest_NonAuth_LeftLittleFinger_Vid_all_Valid_Smoke_sid | Oauthdetails request with NonAuth LeftLittleFinger and all valid details VID | 00:00:00 | |
| ESignet_OAuthDetailsRequest_NonAuth_LeftMiddleFingerr_Vid_all_Valid_Smoke_sid | Oauthdetails request with NonAuth LeftMiddleFinger and all valid details VID | 00:00:00 | |
| ESignet_OAuthDetailsRequest_NonAuth_LeftThumb_Vid_all_Valid_Smoke_sid | Oauthdetails request with NonAuth LeftThumb and all valid details VID | 00:00:00 | |
| ESignet_OAuthDetailsRequest_NonAuth_Otp_Vid_all_Valid_Smoke_sid | Oauthdetails request with NonAuth Otp and all valid details VID | 00:00:00 | |
| ESignet_OAuthDetailsRequest_NonAuth_RightIndexFinger_Vid_all_Valid_Smoke_sid | Oauthdetails request with NonAuth RightIndexFinger and all valid details VID | 00:00:00 | |
| ESignet_OAuthDetailsRequest_NonAuth_RightIris_Vid_all_Valid_Smoke_sid | Oauthdetails request with NonAuth RightIris and all valid details VID | 00:00:00 | |
| ESignet_OAuthDetailsRequest_NonAuth_RightLittleFinger_Vid_all_Valid_Smoke_sid | Oauthdetails request with NonAuth RightLittleFinger and all valid details VID | 00:00:00 | |
| ESignet_OAuthDetailsRequest_NonAuth_RightMiddleFinger_Vid_all_Valid_Smoke_sid | Oauthdetails request with NonAuth RightMiddleFinger and all valid details VID | 00:00:00 | |
| ESignet_OAuthDetailsRequest_NonAuth_RightRingFinger_Vid_all_Valid_Smoke_sid | Oauthdetails request with NonAuth RightRingFinger and all valid details VID | 00:00:00 | |
| ESignet_OAuthDetailsRequest_NonAuth_RightThumb_Vid_all_Valid_Smoke_sid | Oauthdetails request with NonAuth RightThumb and all valid details VID | 00:00:00 | |
| ESignet_OAuthDetailsRequest_NonAuth_RingFinger_Vid_all_Valid_Smoke_sid | Oauthdetails request with NonAuth RingFinger and all valid details VID | 00:00:00 | |
| OAuthDetailsRequestNonAuth — Passed | |||
| ESignet_OAuthDetailsRequest_NonAuth_BioFace_all_Valid_Smoke_sid | Oauthdetails request with NonAuth BioFace and all valid details | 00:00:00 | |
| ESignet_OAuthDetailsRequest_NonAuth_LeftIris_all_Valid_Smoke_sid | Oauthdetails request with NonAuth LeftIris and all valid details | 00:00:00 | |
| ESignet_OAuthDetailsRequest_NonAuth_LeftLittleFinger_all_Valid_Smoke_sid | Oauthdetails request with NonAuth LeftLittleFinger and all valid details | 00:00:00 | |
| ESignet_OAuthDetailsRequest_NonAuth_LeftMiddleFingerr_all_Valid_Smoke_sid | Oauthdetails request with NonAuth LeftMiddleFinger and all valid details | 00:00:00 | |
| ESignet_OAuthDetailsRequest_NonAuth_LeftThumb_all_Valid_Smoke_sid | Oauthdetails request with NonAuth LeftThumb and all valid details | 00:00:00 | |
| ESignet_OAuthDetailsRequest_NonAuth_Otp_all_Valid_Smoke_sid | Oauthdetails request with NonAuth Otp and all valid details | 00:00:00 | |
| ESignet_OAuthDetailsRequest_NonAuth_RightIndexFinger_all_Valid_Smoke_sid | Oauthdetails request with NonAuth RightIndexFinger and all valid details | 00:00:00 | |
| ESignet_OAuthDetailsRequest_NonAuth_RightIris_all_Valid_Smoke_sid | Oauthdetails request with NonAuth RightIris and all valid details | 00:00:00 | |
| ESignet_OAuthDetailsRequest_NonAuth_RightLittleFinger_all_Valid_Smoke_sid | Oauthdetails request with NonAuth RightLittleFinger and all valid details | 00:00:00 | |
| ESignet_OAuthDetailsRequest_NonAuth_RightMiddleFinger_all_Valid_Smoke_sid | Oauthdetails request with NonAuth RightMiddleFinger and all valid details | 00:00:00 | |
| ESignet_OAuthDetailsRequest_NonAuth_RightRingFinger_all_Valid_Smoke_sid | Oauthdetails request with NonAuth RightRingFinger and all valid details | 00:00:00 | |
| ESignet_OAuthDetailsRequest_NonAuth_RightThumb_all_Valid_Smoke_sid | Oauthdetails request with NonAuth RightThumb and all valid details | 00:00:00 | |
| ESignet_OAuthDetailsRequest_NonAuth_RingFinger_all_Valid_Smoke_sid | Oauthdetails request with NonAuth RingFinger and all valid details | 00:00:00 | |
| BioNonAuth — Ignored | |||
| ESignet_BioAuth_Biometric_Face_NonAuth_With_Valid_uin_Smoke_Pos | Face biometric with NonAuth and valid details UIN | 00:00:00 | |
| ESignet_BioAuth_Biometric_LeftIris_With_Vid_NonAuth_Neg | LeftIris biometric with NonAuth VID | 00:00:00 | |
| ESignet_BioAuth_Biometric_LeftIris_With_uin_NonAuth_Neg | LeftIris biometric with NonAuth UIN | 00:00:00 | |
| ESignet_BioAuth_Biometric_LeftLittleFinger_With_Vid_NonAuth_Neg | LeftLittleFinger biometric with NonAuth VID | 00:00:00 | |
| ESignet_BioAuth_Biometric_LeftLittleFinger_With_uin_NonAuth_Neg | LeftLittleFinger biometric with NonAuth UIN | 00:00:00 | |
| ESignet_BioAuth_Biometric_LeftMiddleFingerr_With_Vid_NonAuth_Neg | LeftMiddleFinger biometric with NonAuth VID | 00:00:00 | |
| ESignet_BioAuth_Biometric_LeftMiddleFingerr_With_uin_NonAuth_Neg | LeftMiddleFinger biometric with NonAuth UIN | 00:00:00 | |
| ESignet_BioAuth_Biometric_LeftThumb_With_Vid_NonAuth_Neg | LeftThumb biometric with NonAuth VID | 00:00:00 | |
| ESignet_BioAuth_Biometric_LeftThumb_With_uin_NonAuth_Neg | LeftThumb biometric with NonAuth UIN | 00:00:00 | |
| ESignet_BioAuth_Biometric_RightIndexFinger_With_Vid_NonAuth_Neg | RightIndexFinger biometric with NonAuth VID | 00:00:00 | |
| ESignet_BioAuth_Biometric_RightIndexFinger_With_uin_NonAuth_Neg | RightIndexFinger biometric with NonAuth UIN | 00:00:00 | |
| ESignet_BioAuth_Biometric_RightIris_With_Vid_NonAuth_Neg | RightIris biometric with NonAuth VID | 00:00:00 | |
| ESignet_BioAuth_Biometric_RightIris_With_uin_NonAuth_Neg | RightIris biometric with NonAuth UIN | 00:00:00 | |
| ESignet_BioAuth_Biometric_RightLittleFinger_With_Vid_NonAuth_Neg | RightLittleFinger biometric with NonAuth VID | 00:00:00 | |
| ESignet_BioAuth_Biometric_RightLittleFinger_With_uin_NonAuth_Neg | RightLittleFinger biometric with NonAuth UIN | 00:00:00 | |
| ESignet_BioAuth_Biometric_RightMiddleFinger_With_Vid_NonAuth_Neg | RightMiddleFinger biometric with NonAuth VID | 00:00:00 | |
| ESignet_BioAuth_Biometric_RightMiddleFinger_With_uin_NonAuth_Neg | RightMiddleFinger biometric with NonAuth UIN | 00:00:00 | |
| ESignet_BioAuth_Biometric_RightRingFinger_With_Vid_NonAuth_Neg | RightRingFinger biometric with NonAuth VID | 00:00:00 | |
| ESignet_BioAuth_Biometric_RightRingFinger_With_uin_NonAuth_Neg | RightRingFinger biometric with NonAuth UIN | 00:00:00 | |
| ESignet_BioAuth_Biometric_RightThumb_With_Vid_NonAuth_Neg | RightThumb biometric with NonAuth VID | 00:00:00 | |
| ESignet_BioAuth_Biometric_RightThumb_With_uin_NonAuth_Neg | RightThumb biometric with NonAuth UIN | 00:00:00 | |
| ESignet_BioAuth_Biometric_RingFinger_With_Vid_NonAuth_Neg | RingFinger biometric with NonAuth VID | 00:00:00 | |
| ESignet_BioAuth_Biometric_RingFinger_With_uin_NonAuth_Neg | RingFinger biometric with NonAuth UIN | 00:00:00 | |
| ESignet_BioNonAuth_Biometric_Face_NonAuth_With_Valid_Vid_Smoke_Pos | Face biometric with NonAuth and valid details VID | 00:00:00 | |
| AuthenticateUserNonAuth — Ignored | |||
| ESignet_AuthenticateUserIDP_NonAuth_Otp_Vid_Valid_Smoke | Authenticate User with NonAuth Otp with valid details VID | 00:00:00 | |
| ESignet_AuthenticateUserIDP_NonAuth_uin_Otp_Valid_Smoke | Authenticate User with NonAuth Otp with valid details UIN | 00:00:00 | |
| OAuthDetailsRequestConsent — Ignored | |||
| ESignet_OAuthDetailsRequest_Consent_Vid_Claim2_all_Valid_Smoke_sid | Oauthdetails request for consent with claim2 and all valid details VID | 00:00:00 | |
| ESignet_OAuthDetailsRequest_Consent_Vid_User2_all_Valid_Smoke_sid | Oauthdetails request for user2 with all valid details VID | 00:00:00 | |
| ESignet_OAuthDetailsRequest_Consent_Vid_all_Valid_Smoke_sid | Oauthdetails request for consent with all valid details VID | 00:00:00 | |
| OAuthDetailsRequestConsent — Passed | |||
| ESignet_OAuthDetailsRequest_Consent_Claim2_all_Valid_Smoke_sid | Oauthdetails request for consent with claim2 and all valid details | 00:00:00 | |
| ESignet_OAuthDetailsRequest_Consent_Invalid_Scen_Smoke_sid | Oauthdetails request for consent with invalid scen | 00:00:00 | |
| ESignet_OAuthDetailsRequest_Consent_User2_all_Valid_Smoke_sid | Oauthdetails request for user2 with all valid details | 00:00:00 | |
| ESignet_OAuthDetailsRequest_Consent_all_Valid_Smoke_sid | Oauthdetails request for consent with all valid details | 00:00:00 | |
| AuthenticateUserConsent — Ignored | |||
| ESignet_AuthenticateUserIDP_Consent_Vid_Otp_Claim2_Valid_Smoke | Authenticate user consent with otp for claim2 valid details VID | 00:00:00 | |
| ESignet_AuthenticateUserIDP_Consent_Vid_Otp_Invalid_IndividualId_Neg | Authenticate user consent Otp with invalid individualId VID | 00:00:00 | |
| ESignet_AuthenticateUserIDP_Consent_Vid_Otp_Invalid_TransactionId_Neg | Authenticate user consent Otp with invalid transactionId VID | 00:00:00 | |
| ESignet_AuthenticateUserIDP_Consent_Vid_Otp_Valid_Smoke | Authenticate user consent with otp and valid details VID | 00:00:00 | |
| ESignet_AuthenticateUserIDP_Consent_Vid_User2_Otp_Valid_Smoke | Authenticate user consent Otp for User2 with valid details UIN | 00:00:00 | |
| AuthenticateUserConsent — Passed | |||
| ESignet_AuthenticateUserIDP_Consent_uin_Otp_Claim2_Valid_Smoke | Authenticate user consent with otp for claim2 valid details UIN | 00:00:00 | |
| ESignet_AuthenticateUserIDP_Consent_uin_Otp_Invalid_IndividualId_Neg | Authenticate user consent Otp with invalid individualId UIN | 00:00:00 | |
| ESignet_AuthenticateUserIDP_Consent_uin_Otp_Invalid_TransactionId_Neg | Authenticate user consent Otp with invalid transactionId UIN | 00:00:00 | |
| ESignet_AuthenticateUserIDP_Consent_uin_Otp_Valid_Smoke | Authenticate user consent with otp and valid details UIN | 00:00:00 | |
| ESignet_AuthenticateUserIDP_Consent_uin_User2_Otp_Valid_Smoke | Authenticate user consent Otp for User2 with valid details UIN | 00:00:00 | |
| AuthorizationCodeConsent — Ignored | |||
| ESignet_AuthorizationCode_Consent_Vid_All_Valid_Smoke_sid | AuthorizationCode consent with all valid details VID | 00:00:00 | |
| ESignet_AuthorizationCode_Consent_Vid_Claim2_All_Valid_Smoke_sid | AuthorizationCode consent with claim2 and all valid details VID | 00:00:00 | |
| AuthorizationCodeConsent — Passed | |||
| ESignet_AuthorizationCode_Consent_uin_All_Valid_Smoke_sid | AuthorizationCode consent with all valid details UIN | 00:00:00 | |
| ESignet_AuthorizationCode_Consent_uin_Claim2_All_Valid_Smoke_sid | AuthorizationCode consent with claim2 and all valid details UIN | 00:00:00 | |
| GenerateTokenConsent — Ignored | |||
| ESignet_GenerateToken_Consent_Vid_Claim2_Valid_Smoke_sid | Generate token consent with claim2 and valid details VID | 00:00:00 | |
| ESignet_GenerateToken_Consent_Vid_Valid_Smoke_sid | Generate token consent with valid details VID | 00:00:00 | |
| GenerateTokenConsent — Passed | |||
| ESignet_GenerateToken_Consent_uin_Claim2_Valid_Smoke_sid | Generate token consent with claim2 and valid details UIN | 00:00:00 | |
| ESignet_GenerateToken_Consent_uin_Valid_Smoke_sid | Generate token consent with valid details UIN | 00:00:00 | |
| GetOidcUserInfoConsent — Ignored | |||
| ESignet_GetOidcUserInfo_Consent_Vid_IdpAccessToken_StatusCode_Claim2_Valid_Smoke_sid | Get OIDC user info consent with claim2 and valid details VID | 00:00:00 | |
| ESignet_GetOidcUserInfo_Consent_Vid_IdpAccessToken_StatusCode_Valid_Smoke_sid | Get OIDC user info consent with all valid details VID | 00:00:00 | |
| GetOidcUserInfoConsent — Passed | |||
| ESignet_GetOidcUserInfo_Consent_uin_IdpAccessToken_StatusCode_Claim2_Valid_Smoke_sid | Get OIDC user info consent with claim2 and valid details UIN | 00:00:00 | |
| ESignet_GetOidcUserInfo_Consent_uin_IdpAccessToken_StatusCode_Valid_Smoke_sid | Get OIDC user info consent with all valid details UIN | 00:00:00 | |
| OAuthDetailsRequest — Ignored | |||
| ESignet_OAuthDetailsRequest_Consent_Vid_2nd_Valid_Smoke_sid | Oauthdetails request consent 2nd with all valid details VID | 00:00:00 | |
| ESignet_OAuthDetailsRequest_SendOtp_Vid_Valid_Smoke_sid | Oauthdetails request sendOtp with all valid details VID | 00:00:00 | |
| ESignet_OAuthDetailsRequest_Vid_Valid_Smoke_sid | Oauthdetails request with all valid details VID | 00:00:00 | |
| OAuthDetailsRequest — Passed | |||
| ESignet_OAuthDetailsRequest_10all_Valid_Smoke_sid | Oauthdetails request 10 with all valid details | 00:00:00 | |
| ESignet_OAuthDetailsRequest_11all_Valid_Smoke_sid | Oauthdetails request 11 with all valid details | 00:00:00 | |
| ESignet_OAuthDetailsRequest_12all_Valid_Smoke_sid | Oauthdetails request 12 with all valid details | 00:00:00 | |
| ESignet_OAuthDetailsRequest_13all_Valid_Smoke_sid | Oauthdetails request 13 with all valid details | 00:00:00 | |
| ESignet_OAuthDetailsRequest_14all_Valid_Smoke_sid | Oauthdetails request 14 with all valid details | 00:00:00 | |
| ESignet_OAuthDetailsRequest_15all_Valid_Smoke_sid | Oauthdetails request 15 with all valid details | 00:00:00 | |
| ESignet_OAuthDetailsRequest_16all_Valid_Smoke_sid | Oauthdetails request 16 with all valid details | 00:00:00 | |
| ESignet_OAuthDetailsRequest_17all_Valid_Smoke_sid | Oauthdetails request 17 with all valid details | 00:00:00 | |
| ESignet_OAuthDetailsRequest_18all_Valid_Smoke_sid | Oauthdetails request 18 with all valid details | 00:00:00 | |
| ESignet_OAuthDetailsRequest_19all_Valid_Smoke_sid | Oauthdetails request 19 with all valid details | 00:00:00 | |
| ESignet_OAuthDetailsRequest_20all_Valid_Smoke_sid | Oauthdetails request 20 with all valid details | 00:00:00 | |
| ESignet_OAuthDetailsRequest_21all_Valid_Smoke_sid | Oauthdetails request 21 with all valid details | 00:00:00 | |
| ESignet_OAuthDetailsRequest_22all_Valid_Smoke_sid | Oauthdetails request 22 with all valid details | 00:00:00 | |
| ESignet_OAuthDetailsRequest_23all_Valid_Smoke_sid | Oauthdetails request 23 with all valid details | 00:00:00 | |
| ESignet_OAuthDetailsRequest_24all_Valid_Smoke_sid | Oauthdetails request 24 with all valid details | 00:00:00 | |
| ESignet_OAuthDetailsRequest_25all_Valid_Smoke_sid | Oauthdetails request 25 with all valid details | 00:00:00 | |
| ESignet_OAuthDetailsRequest_2_all_Valid_Smoke_sid | Oauthdetails request 2 with all valid details | 00:00:00 | |
| ESignet_OAuthDetailsRequest_2all_Valid_Smoke_sid | Oauthdetails request 2 with all valid details | 00:00:00 | |
| ESignet_OAuthDetailsRequest_2nd_Valid_Smoke_sid | Oauthdetails request 2nd with all valid details | 00:00:00 | |
| ESignet_OAuthDetailsRequest_2nd_vid_Valid_Smoke_sid | Oauthdetails request 2nd with all valid details VID | 00:00:00 | |
| ESignet_OAuthDetailsRequest_3all_Valid_Smoke_sid | Oauthdetails request 3 with all valid details | 00:00:00 | |
| ESignet_OAuthDetailsRequest_4all_Valid_Smoke_sid | Oauthdetails request 4 with all valid details | 00:00:00 | |
| ESignet_OAuthDetailsRequest_5all_Valid_Smoke_sid | Oauthdetails request 5 with all valid details | 00:00:00 | |
| ESignet_OAuthDetailsRequest_6all_Valid_Smoke_sid | Oauthdetails request 6 with all valid details | 00:00:00 | |
| ESignet_OAuthDetailsRequest_7all_Valid_Smoke_sid | Oauthdetails request 7 with all valid details | 00:00:00 | |
| ESignet_OAuthDetailsRequest_8all_Valid_Smoke_sid | Oauthdetails request 8 with all valid details | 00:00:00 | |
| ESignet_OAuthDetailsRequest_9all_Valid_Smoke_sid | Oauthdetails request 9 with all valid details | 00:00:00 | |
| ESignet_OAuthDetailsRequest_Consent_2nd_Valid_Smoke_sid | Oauthdetails request consent 2nd with all valid details | 00:00:00 | |
| ESignet_OAuthDetailsRequest_Diff_requestTime_Neg | Oauthdetails request with different requestTime | 00:00:00 | |
| ESignet_OAuthDetailsRequest_Empty_AcrValues_Pos | Oauthdetails request with empty value in AcrValues | 00:00:00 | |
| ESignet_OAuthDetailsRequest_Empty_Claims_Neg | Oauthdetails request with empty value in Claims | 00:00:00 | |
| ESignet_OAuthDetailsRequest_Empty_ClientId_Neg | Oauthdetails request with empty value in ClientId | 00:00:00 | |
| ESignet_OAuthDetailsRequest_Empty_Nonce_Pos | Oauthdetails request with empty value in Nonce | 00:00:00 | |
| ESignet_OAuthDetailsRequest_Empty_Prompt_Neg | Oauthdetails request with empty value in prompt | 00:00:00 | |
| ESignet_OAuthDetailsRequest_Empty_ResponseType_Neg | Oauthdetails request with empty value in ResponseType | 00:00:00 | |
| ESignet_OAuthDetailsRequest_Empty_Scope_Neg | Oauthdetails request with empty value in Scope | 00:00:00 | |
| ESignet_OAuthDetailsRequest_Empty_State_Pos | Oauthdetails request with empty value in state | 00:00:00 | |
| ESignet_OAuthDetailsRequest_Empty_claimsLocales_Pos | Oauthdetails request with empty value in claimsLocales | 00:00:00 | |
| ESignet_OAuthDetailsRequest_Empty_display_Neg | Oauthdetails request with empty value in display | 00:00:00 | |
| ESignet_OAuthDetailsRequest_Empty_redirectUri_Neg | Oauthdetails request with empty value in redirectUri | 00:00:00 | |
| ESignet_OAuthDetailsRequest_Exceding_Range_ClientId_Neg | Oauthdetails request with exceeding range in ClientId | 00:00:00 | |
| ESignet_OAuthDetailsRequest_Exceding_Range_State_Pos | Oauthdetails request with exceeding range in state | 00:00:00 | |
| ESignet_OAuthDetailsRequest_Invalid_AcrValues_Pos | Oauthdetails request with Invalid AcrValues | 00:00:00 | |
| ESignet_OAuthDetailsRequest_Invalid_Claims_Pos | Oauthdetails request with invalid Claims | 00:00:00 | |
| ESignet_OAuthDetailsRequest_Invalid_ClientId_Neg | Oauthdetails request with Invalid ClientId | 00:00:00 | |
| ESignet_OAuthDetailsRequest_Invalid_Format_AcrValues_Pos | Oauthdetails request with Invalid format AcrValues | 00:00:00 | |
| ESignet_OAuthDetailsRequest_Invalid_Prompt_Neg | Oauthdetails request with invalid prompt | 00:00:00 | |
| ESignet_OAuthDetailsRequest_Invalid_Range_ClientId_Neg | Oauthdetails request with Invalid range in ClientId | 00:00:00 | |
| ESignet_OAuthDetailsRequest_Invalid_ResponseType_Neg | Oauthdetails request with Invalid ResponseType | 00:00:00 | |
| ESignet_OAuthDetailsRequest_Invalid_Scope_Neg | Oauthdetails request with Invalid Scope | 00:00:00 | |
| ESignet_OAuthDetailsRequest_Invalid_State_Pos | Oauthdetails request with invalid state | 00:00:00 | |
| ESignet_OAuthDetailsRequest_Invalid_claimsLocales_Pos | Oauthdetails request with invalid claimsLocales | 00:00:00 | |
| ESignet_OAuthDetailsRequest_Invalid_display_Neg | Oauthdetails request with invalid display | 00:00:00 | |
| ESignet_OAuthDetailsRequest_Invalid_redirectUri_Neg | Oauthdetails request with Invalid redirectUri | 00:00:00 | |
| ESignet_OAuthDetailsRequest_Invalid_requestTime_Neg | Oauthdetails request with invalid requestTime | 00:00:00 | |
| ESignet_OAuthDetailsRequest_Missing_AcrValues_Pos | Oauthdetails request without AcrValues | 00:00:00 | |
| ESignet_OAuthDetailsRequest_Missing_Claims_Pos | Oauthdetails request without Claims | 00:00:00 | |
| ESignet_OAuthDetailsRequest_Missing_ClientId_Neg | Oauthdetails request without ClientId | 00:00:00 | |
| ESignet_OAuthDetailsRequest_Missing_Nonce_Pos | Oauthdetails request without Nonce | 00:00:00 | |
| ESignet_OAuthDetailsRequest_Missing_Prompt_Pos | Oauthdetails request without prompt | 00:00:00 | |
| ESignet_OAuthDetailsRequest_Missing_ResponseType_Neg | Oauthdetails request without ResponseType | 00:00:00 | |
| ESignet_OAuthDetailsRequest_Missing_Scope_Neg | Oauthdetails request without Scope | 00:00:00 | |
| ESignet_OAuthDetailsRequest_Missing_State_Pos | Oauthdetails request without state | 00:00:00 | |
| ESignet_OAuthDetailsRequest_Missing_claimsLocales_Pos | Oauthdetails request without claimsLocales | 00:00:00 | |
| ESignet_OAuthDetailsRequest_Missing_display_Pos | Oauthdetails request without display | 00:00:00 | |
| ESignet_OAuthDetailsRequest_Missing_redirectUri_Neg | Oauthdetails request without redirectUri | 00:00:00 | |
| ESignet_OAuthDetailsRequest_Null_AcrValues_Pos | Oauthdetails request with Null in AcrValues | 00:00:00 | |
| ESignet_OAuthDetailsRequest_Null_Prompt_Neg | Oauthdetails request with Null in prompt | 00:00:00 | |
| ESignet_OAuthDetailsRequest_Null_ResponseType_Neg | Oauthdetails request with Null in ResponseType | 00:00:00 | |
| ESignet_OAuthDetailsRequest_Null_Scope_Neg | Oauthdetails request with Null in Scope | 00:00:00 | |
| ESignet_OAuthDetailsRequest_Null_State_Pos | Oauthdetails request with Null in state | 00:00:00 | |
| ESignet_OAuthDetailsRequest_Null_claimsLocales_Pos | Oauthdetails request with Null in claimsLocales | 00:00:00 | |
| ESignet_OAuthDetailsRequest_Null_display_Neg | Oauthdetails request with Null in display | 00:00:00 | |
| ESignet_OAuthDetailsRequest_Null_redirectUri_Neg | Oauthdetails request with Null in redirectUri | 00:00:00 | |
| ESignet_OAuthDetailsRequest_Other_Valid_Smoke_sid | Oauthdetails request with other valid details | 00:00:00 | |
| ESignet_OAuthDetailsRequest_SpaceValue_display_Neg | Oauthdetails request with space in display | 00:00:00 | |
| ESignet_OAuthDetailsRequest_WithoutSpace_AcrValues_Pos | Oauthdetails request without space in AcrValues | 00:00:00 | |
| ESignet_OAuthDetailsRequest_WithoutSpace_Scope_Neg | Oauthdetails request without space in Scope | 00:00:00 | |
| ESignet_OAuthDetailsRequest_all_Valid_Smoke_sid | Oauthdetails request with all valid details | 00:00:00 | |
| ESignet_OAuthDetailsRequest_space_delimited_Prompt_Neg | Oauthdetails request with space delimited in prompt | 00:00:00 | |
| ESignet_OAuthDetailsRequest_vid_Other_Valid_Smoke_sid | Oauthdetails request with other valid details VID | 00:00:00 | |
| BioAuthIdp — Ignored | |||
| ESignet_BioAuth_Biometric_Face_With_Valid_Vid_Smoke_Pos | Biometric Face Auth with all valid details VID | 00:00:00 | |
| ESignet_BioAuth_Biometric_Face_With_Valid_uin_Smoke_Pos | Biometric Face Auth with all valid details UIN | 00:00:00 | |
| ESignet_BioAuth_Biometric_LeftIris_With_Valid_Vid_Smoke_Pos | Biometric LeftIris Auth with all valid details VID | 00:00:00 | |
| ESignet_BioAuth_Biometric_LeftIris_With_Valid_uin_Smoke_Pos | Biometric LeftIris Auth with all valid details UIN | 00:00:00 | |
| ESignet_BioAuth_Biometric_LeftLittleFinger_With_Valid_Vid_Smoke_Pos | Biometric LeftLittleFinger Auth with all valid details VID | 00:00:00 | |
| ESignet_BioAuth_Biometric_LeftLittleFinger_With_Valid_uin_Smoke_Pos | Biometric LeftLittleFinger Auth with all valid details UIN | 00:00:00 | |
| ESignet_BioAuth_Biometric_LeftMiddleFingerr_With_Valid_Vid_Smoke_Pos | Biometric LeftMiddleFinger Auth with all valid details VID | 00:00:00 | |
| ESignet_BioAuth_Biometric_LeftMiddleFingerr_With_Valid_uin_Smoke_Pos | Biometric LeftMiddleFinger Auth with all valid details UIN | 00:00:00 | |
| ESignet_BioAuth_Biometric_LeftThumb_With_Valid_Vid_Smoke_Pos | Biometric LeftThumb Auth with all valid details VID | 00:00:00 | |
| ESignet_BioAuth_Biometric_LeftThumb_With_Valid_uin_Smoke_Pos | Biometric LeftThumb Auth with all valid details UIN | 00:00:00 | |
| ESignet_BioAuth_Biometric_RightIndexFinger_With_Valid_Vid_Smoke_Pos | Biometric RightIndexFinger Auth with all valid details VID | 00:00:00 | |
| ESignet_BioAuth_Biometric_RightIndexFinger_With_Valid_uin_Smoke_Pos | Biometric RightIndexFinger Auth with all valid details UIN | 00:00:00 | |
| ESignet_BioAuth_Biometric_RightIris_With_Valid_Vid_Smoke_Pos | Biometric RightIris Auth with all valid details VID | 00:00:00 | |
| ESignet_BioAuth_Biometric_RightIris_With_Valid_uin_Smoke_Pos | Biometric RightIris Auth with all valid details UIN | 00:00:00 | |
| ESignet_BioAuth_Biometric_RightLittleFinger_With_Valid_Vid_Smoke_Pos | Biometric RightLittleFinger Auth with all valid details VID | 00:00:00 | |
| ESignet_BioAuth_Biometric_RightLittleFinger_With_Valid_uin_Smoke_Pos | Biometric RightLittleFinger Auth with all valid details UIN | 00:00:00 | |
| ESignet_BioAuth_Biometric_RightMiddleFinger_With_Valid_Vid_Smoke_Pos | Biometric RightMiddleFinger Auth with all valid details VID | 00:00:00 | |
| ESignet_BioAuth_Biometric_RightMiddleFinger_With_Valid_uin_Smoke_Pos | Biometric RightMiddleFinger Auth with all valid details UIN | 00:00:00 | |
| ESignet_BioAuth_Biometric_RightRingFinger_With_Valid_Vid_Smoke_Pos | Biometric RightRingFinger Auth with all valid details VID | 00:00:00 | |
| ESignet_BioAuth_Biometric_RightRingFinger_With_Valid_uin_Smoke_Pos | Biometric RightRingFinger Auth with all valid details UIN | 00:00:00 | |
| ESignet_BioAuth_Biometric_RightThumb_With_Valid_Vid_Smoke_Pos | Biometric RightThumb Auth with all valid details VID | 00:00:00 | |
| ESignet_BioAuth_Biometric_RightThumb_With_Valid_uin_Smoke_Pos | Biometric RightThumb Auth with all valid details UIN | 00:00:00 | |
| ESignet_BioAuth_Biometric_RingFinger_With_Valid_Vid_Smoke_Pos | Biometric RingFinger Auth with all valid details VID | 00:00:00 | |
| ESignet_BioAuth_Biometric_RingFinger_With_Valid_uin_Smoke_Pos | Biometric RingFinger Auth with all valid details UIN | 00:00:00 | |
| SendOtp — Ignored | |||
| ESignet_SendOtp_Vid_Diff_RequestTime_Neg | SendOtp with different requestTime VID | 00:00:00 | |
| ESignet_SendOtp_Vid_Empty_OtpChannel_Neg | SendOtp with empty value in OtpChannels VID | 00:00:00 | |
| ESignet_SendOtp_Vid_Empty_OtpChannels_Neg | SendOtp with empty value in OtpChannels VID | 00:00:00 | |
| ESignet_SendOtp_Vid_Empty_individualId_Neg | SendOtp with empty value in individualId VID | 00:00:00 | |
| ESignet_SendOtp_Vid_Empty_transactionId_Neg | SendOtp with empty value in transactionId VID | 00:00:00 | |
| ESignet_SendOtp_Vid_Expired_transactionId_Neg | SendOtp with expired transactionId VID | 00:00:00 | |
| ESignet_SendOtp_Vid_Future_RequestTime_Neg | SendOtp with future requestTime VID | 00:00:00 | |
| ESignet_SendOtp_Vid_Invalid_OtpChannels_Neg | SendOtp with invalid OtpChannels VID | 00:00:00 | |
| ESignet_SendOtp_Vid_Invalid_RequestTime_Neg | SendOtp with invalid requestTime VID | 00:00:00 | |
| ESignet_SendOtp_Vid_Invalid_individualId_Neg | SendOtp with invalid individualId VID | 00:00:00 | |
| ESignet_SendOtp_Vid_Invalid_transactionId_Neg | SendOtp with invalid transactionId VID | 00:00:00 | |
| ESignet_SendOtp_Vid_Missing_OtpChannel_Neg | SendOtp without OtpChannels VID | 00:00:00 | |
| ESignet_SendOtp_Vid_Missing_OtpChannels_Neg | SendOtp without OtpChannels VID | 00:00:00 | |
| ESignet_SendOtp_Vid_Missing_individualId_Neg | SendOtp without individualId VID | 00:00:00 | |
| ESignet_SendOtp_Vid_Missing_transactionId_Neg | SendOtp without transactionId VID | 00:00:00 | |
| ESignet_SendOtp_Vid_Null_OtpChannel_Neg | SendOtp with Null in OtpChannels VID | 00:00:00 | |
| ESignet_SendOtp_Vid_Null_OtpChannels_Neg | SendOtp with Null in OtpChannels VID | 00:00:00 | |
| ESignet_SendOtp_Vid_Null_individualId_Neg | SendOtp with Null in individualId VID | 00:00:00 | |
| ESignet_SendOtp_Vid_Null_transactionId_Neg | SendOtp with Null in transactionId VID | 00:00:00 | |
| ESignet_SendOtp_Vid_SpaceSeparated_otpChannels_Neg | SendOtp to space separated OtpChannels VID | 00:00:00 | |
| ESignet_SendOtp_Vid_all_Valid_Smoke | SendOtp with all valid details VID | 00:00:00 | |
| SendOtp — Passed | |||
| ESignet_SendOtp_NR_Email_Uin_Neg | SendOtp to unregistered email UIN | 00:00:00 | |
| ESignet_SendOtp_NR_Phone_Uin_Neg | SendOtp to unregistered Phone UIN | 00:00:00 | |
| ESignet_SendOtp_uin_Diff_RequestTime_Neg | SendOtp with different requestTime UIN | 00:00:00 | |
| ESignet_SendOtp_uin_Empty_OtpChannel_Neg | SendOtp with empty value in OtpChannels UIN | 00:00:00 | |
| ESignet_SendOtp_uin_Empty_OtpChannels_Neg | SendOtp with empty value in OtpChannels UIN | 00:00:00 | |
| ESignet_SendOtp_uin_Empty_individualId_Neg | SendOtp with empty value in individualId UIN | 00:00:00 | |
| ESignet_SendOtp_uin_Empty_transactionId_Neg | SendOtp with empty value in transactionId UIN | 00:00:00 | |
| ESignet_SendOtp_uin_Expired_transactionId_Neg | SendOtp with expired transactionId UIN | 00:00:00 | |
| ESignet_SendOtp_uin_Future_RequestTime_Neg | SendOtp with future requestTime UIN | 00:00:00 | |
| ESignet_SendOtp_uin_Invalid_OtpChannels_Neg | SendOtp to invalid OtpChannels UIN | 00:00:00 | |
| ESignet_SendOtp_uin_Invalid_RequestTime_Neg | SendOtp with invalid requestTime UIN | 00:00:00 | |
| ESignet_SendOtp_uin_Invalid_individualId_Neg | SendOtp with invalid individualId UIN | 00:00:00 | |
| ESignet_SendOtp_uin_Invalid_transactionId_Neg | SendOtp with invalid transactionId UIN | 00:00:00 | |
| ESignet_SendOtp_uin_Missing_OtpChannel_Neg | SendOtp without OtpChannels UIN | 00:00:00 | |
| ESignet_SendOtp_uin_Missing_OtpChannels_Neg | SendOtp without OtpChannels UIN | 00:00:00 | |
| ESignet_SendOtp_uin_Missing_individualId_Neg | SendOtp without individualId UIN | 00:00:00 | |
| ESignet_SendOtp_uin_Missing_transactionId_Neg | SendOtp without transactionId UIN | 00:00:00 | |
| ESignet_SendOtp_uin_Null_OtpChannel_Neg | SendOtp with Null in OtpChannels UIN | 00:00:00 | |
| ESignet_SendOtp_uin_Null_OtpChannels_Neg | SendOtp with Null in OtpChannels UIN | 00:00:00 | |
| ESignet_SendOtp_uin_Null_individualId_Neg | SendOtp with Null in individualId UIN | 00:00:00 | |
| ESignet_SendOtp_uin_Null_transactionId_Neg | SendOtp with Null in transactionId UIN | 00:00:00 | |
| ESignet_SendOtp_uin_SpaceSeparated_otpChannels_Neg | SendOtp to space separated OtpChannels UIN | 00:00:00 | |
| ESignet_SendOtp_uin_all_Valid_Smoke | SendOtp with all valid details UIN | 00:00:00 | |
| AuthenticateUser — Ignored | |||
| ESignet_AuthenticateUserIDP_Consent_Vid_Otp_Same_Claims | Authenticate user consent Otp with same claims VID | 00:00:00 | |
| ESignet_AuthenticateUserIDP_Otp_Vid_Invalid_Neg | Authenticate user Otp with invalid VID | 00:00:00 | |
| ESignet_AuthenticateUserIDP_Otp_Vid_Valid_Smoke | Authenticate user with valid details VID | 00:00:00 | |
| ESignet_AuthenticateUserIDP_Vid_2_Otp_UnAuthenticated_Neg | Send authentication request with unauthenticated transactionId VID | 00:00:00 | |
| ESignet_AuthenticateUserIDP_Vid_2nd_Otp_Valid_Smoke | Authenticate user with 2nd Otp and valid details VID | 00:00:00 | |
| ESignet_AuthenticateUserIDP_Vid_Diff_AuthFactorType_Neg | Authenticate user with different AuthFactorType VID | 00:00:00 | |
| ESignet_AuthenticateUserIDP_Vid_Diff_RequestTime_Neg | Authenticate user with different requestTime VID | 00:00:00 | |
| ESignet_AuthenticateUserIDP_Vid_Empty_AuthFactorType_Neg | Authenticate user with empty value in AuthFactorType VID | 00:00:00 | |
| ESignet_AuthenticateUserIDP_Vid_Empty_Challenge_Neg | Authenticate user with empty value in challenge VID | 00:00:00 | |
| ESignet_AuthenticateUserIDP_Vid_Empty_IndividualId_Neg | Authenticate user with empty value in individualId VID | 00:00:00 | |
| ESignet_AuthenticateUserIDP_Vid_Empty_TransactionId_Neg | Authenticate user with empty value in transactionId VID | 00:00:00 | |
| ESignet_AuthenticateUserIDP_Vid_Expired_TransactionId_Neg | Authenticate user with expired transactionId VID | 00:00:00 | |
| ESignet_AuthenticateUserIDP_Vid_Future_RequestTime_Neg | Authenticate user with future requestTime VID | 00:00:00 | |
| ESignet_AuthenticateUserIDP_Vid_Invalid_AuthFactorType_Neg | Authenticate user with invalid AuthFactorType VID | 00:00:00 | |
| ESignet_AuthenticateUserIDP_Vid_Invalid_Challenge_Neg | Authenticate user with invalid challenge VID | 00:00:00 | |
| ESignet_AuthenticateUserIDP_Vid_Invalid_IndividualId_Neg | Authenticate user with invalid individualId VID | 00:00:00 | |
| ESignet_AuthenticateUserIDP_Vid_Invalid_Otp_Challenge_Neg | Authenticate user with invalid Otp challenge VID | 00:00:00 | |
| ESignet_AuthenticateUserIDP_Vid_Invalid_RequestTime_Neg | Authenticate user with invalid requestTime VID | 00:00:00 | |
| ESignet_AuthenticateUserIDP_Vid_Invalid_TransactionId_Neg | Authenticate user with invalid transactionId VID | 00:00:00 | |
| ESignet_AuthenticateUserIDP_Vid_Missing_AuthFactorType_Neg | Authenticate user without AuthFactorType VID | 00:00:00 | |
| ESignet_AuthenticateUserIDP_Vid_Missing_Challenge_Neg | Authenticate user without challenge VID | 00:00:00 | |
| ESignet_AuthenticateUserIDP_Vid_Missing_IndividualId_Neg | Authenticate user without individualId VID | 00:00:00 | |
| ESignet_AuthenticateUserIDP_Vid_Missing_TransactionId_Neg | Authenticate user without transactionId VID | 00:00:00 | |
| ESignet_AuthenticateUserIDP_Vid_Null_AuthFactorType_Neg | Authenticate user with Null in AuthFactorType VID | 00:00:00 | |
| ESignet_AuthenticateUserIDP_Vid_Null_Challenge_Neg | Authenticate user with Null in challenge VID | 00:00:00 | |
| ESignet_AuthenticateUserIDP_Vid_Null_IndividualId_Neg | Authenticate user with Null in individualId VID | 00:00:00 | |
| ESignet_AuthenticateUserIDP_Vid_Null_TransactionId_Neg | Authenticate user with Null in transactionId VID | 00:00:00 | |
| AuthenticateUser — Passed | |||
| ESignet_AuthenticateUserIDP_Consent_uin_Otp_Same_Claims | Authenticate user consent with Otp and same claims UIN | 00:00:00 | |
| ESignet_AuthenticateUserIDP_uin_2_Otp_UnAuthenticated_Neg | Send authenticate request with unauthenticated transactionId UIN | 00:00:00 | |
| ESignet_AuthenticateUserIDP_uin_2nd_Otp_Valid_Smoke | Authenticate user with 2nd Otp UIN | 00:00:00 | |
| ESignet_AuthenticateUserIDP_uin_Diff_AuthFactorType_Neg | Authenticate user with different AuthFactorType UIN | 00:00:00 | |
| ESignet_AuthenticateUserIDP_uin_Diff_RequestTime_Neg | Authenticate user with different requestTime UIN | 00:00:00 | |
| ESignet_AuthenticateUserIDP_uin_Empty_AuthFactorType_Neg | Authenticate user with empty value in AuthFactorType UIN | 00:00:00 | |
| ESignet_AuthenticateUserIDP_uin_Empty_Challenge_Neg | Authenticate user with empty value in challenge UIN | 00:00:00 | |
| ESignet_AuthenticateUserIDP_uin_Empty_IndividualId_Neg | Authenticate user with empty value in individualId UIN | 00:00:00 | |
| ESignet_AuthenticateUserIDP_uin_Empty_TransactionId_Neg | Authenticate user with empty value in transactionId UIN | 00:00:00 | |
| ESignet_AuthenticateUserIDP_uin_Expired_TransactionId_Neg | Authenticate user with expired transactionId UIN | 00:00:00 | |
| ESignet_AuthenticateUserIDP_uin_Future_RequestTime_Neg | Authenticate user with future requestTime UIN | 00:00:00 | |
| ESignet_AuthenticateUserIDP_uin_Invalid_AuthFactorType_Neg | Authenticate user with invalid AuthFactorType UIN | 00:00:00 | |
| ESignet_AuthenticateUserIDP_uin_Invalid_Challenge_Neg | Authenticate user with invalid challenge UIN | 00:00:00 | |
| ESignet_AuthenticateUserIDP_uin_Invalid_IndividualId_Neg | Authenticate user with invalid individualId UIN | 00:00:00 | |
| ESignet_AuthenticateUserIDP_uin_Invalid_Otp_Challenge_Neg | Authenticate user with invalid Otp challenge UIN | 00:00:00 | |
| ESignet_AuthenticateUserIDP_uin_Invalid_RequestTime_Neg | Authenticate user with invalid requestTime UIN | 00:00:00 | |
| ESignet_AuthenticateUserIDP_uin_Invalid_TransactionId_Neg | Authenticate user with invalid transactionId UIN | 00:00:00 | |
| ESignet_AuthenticateUserIDP_uin_Missing_AuthFactorType_Neg | Authenticate user without AuthFactorType UIN | 00:00:00 | |
| ESignet_AuthenticateUserIDP_uin_Missing_Challenge_Neg | Authenticate user without challenge UIN | 00:00:00 | |
| ESignet_AuthenticateUserIDP_uin_Missing_IndividualId_Neg | Authenticate user without individualId UIN | 00:00:00 | |
| ESignet_AuthenticateUserIDP_uin_Missing_TransactionId_Neg | Authenticate user without transactionId UIN | 00:00:00 | |
| ESignet_AuthenticateUserIDP_uin_Null_AuthFactorType_Neg | Authenticate user with Null in AuthFactorType UIN | 00:00:00 | |
| ESignet_AuthenticateUserIDP_uin_Null_Challenge_Neg | Authenticate user with Null in challenge UIN | 00:00:00 | |
| ESignet_AuthenticateUserIDP_uin_Null_IndividualId_Neg | Authenticate user with Null in individualId UIN | 00:00:00 | |
| ESignet_AuthenticateUserIDP_uin_Null_TransactionId_Neg | Authenticate user with Null in transactionId UIN | 00:00:00 | |
| ESignet_AuthenticateUserIDP_uin_Other_Otp_Valid_Smoke | Authenticate user with other Otp valid details UIN | 00:00:00 | |
| ESignet_AuthenticateUserIDP_uin_Otp_Valid_Smoke | Authenticate user with Otp UIN | 00:00:00 | |
| AuthorizationCode — Ignored | |||
| ESignet_AuthorizationCode_Vid_All_Valid_Smoke_sid | Authorization code request with all valid details VID | 00:00:00 | |
| ESignet_AuthorizationCode_Vid_Diff_requestTime_Neg | Authorization code request with different requestTime VID | 00:00:00 | |
| ESignet_AuthorizationCode_Vid_Empty_PermittedAuthorizeScopes_Neg | Authorization code request with empty value in PermittedAuthorizeScopes VID | 00:00:00 | |
| ESignet_AuthorizationCode_Vid_Empty_TransactionId_Neg | Authorization code request with empty value in transactionId VID | 00:00:00 | |
| ESignet_AuthorizationCode_Vid_Empty_acceptedClaims_Neg | Authorization code request with empty accepted claims VID | 00:00:00 | |
| ESignet_AuthorizationCode_Vid_Expired_TransactionId_Neg | Authorization code request with expired transactionId VID | 00:00:00 | |
| ESignet_AuthorizationCode_Vid_Future_RequestTime_Neg | Authorization code request with future requestTime VID | 00:00:00 | |
| ESignet_AuthorizationCode_Vid_Invalid_PermittedAuthorizeScopes_Neg | Authorization code request with invalid PermittedAuthorizeScopes VID | 00:00:00 | |
| ESignet_AuthorizationCode_Vid_Invalid_TransactionId_Neg | Authorization code request with invalid transactionId VID | 00:00:00 | |
| ESignet_AuthorizationCode_Vid_Invalid_acceptedClaims_Neg | Authorization code request with invalid accepted claims VID | 00:00:00 | |
| ESignet_AuthorizationCode_Vid_Invalid_requestTime_Neg | Authorization code request with invalid requestTime VID | 00:00:00 | |
| ESignet_AuthorizationCode_Vid_Missing_Claims_Neg | Authorization code request without claims VID | 00:00:00 | |
| ESignet_AuthorizationCode_Vid_Missing_TransactionId_Neg | Authorization code request without transactionId VID | 00:00:00 | |
| ESignet_AuthorizationCode_Vid_Null_PermittedAuthorizeScopes_Neg | Authorization code request with Null in PermittedAuthorizeScopes VID | 00:00:00 | |
| ESignet_AuthorizationCode_Vid_Null_TransactionId_Neg | Authorization code request with Null in transactionId VID | 00:00:00 | |
| ESignet_AuthorizationCode_Vid_Null_acceptedClaims_Neg | Authorization code request with Null in accepted claims VID | 00:00:00 | |
| AuthorizationCode — Passed | |||
| ESignet_AuthorizationCode_uin_All_Valid_Smoke_sid | Authorization code request with all valid details UIN | 00:00:00 | |
| ESignet_AuthorizationCode_uin_Diff_requestTime_Neg | Authorization code request with different requestTime UIN | 00:00:00 | |
| ESignet_AuthorizationCode_uin_Empty_PermittedAuthorizeScopes_Neg | Authorization code request with empty PermittedAuthorizeScopes UIN | 00:00:00 | |
| ESignet_AuthorizationCode_uin_Empty_TransactionId_Neg | Authorization code request with empty value in transactionId UIN | 00:00:00 | |
| ESignet_AuthorizationCode_uin_Empty_acceptedClaims_Neg | Authorization code request with empty accepted claims UIN | 00:00:00 | |
| ESignet_AuthorizationCode_uin_Expired_TransactionId_Neg | Authorization code request with expired transactionId UIN | 00:00:00 | |
| ESignet_AuthorizationCode_uin_Future_RequestTime_Neg | Authorization code request with future requestTime UIN | 00:00:00 | |
| ESignet_AuthorizationCode_uin_Invalid_PermittedAuthorizeScopes_Neg | Authorization code request with invalid PermittedAuthorizeScopes UIN | 00:00:00 | |
| ESignet_AuthorizationCode_uin_Invalid_TransactionId_Neg | Authorization code request with invalid transactionId UIN | 00:00:00 | |
| ESignet_AuthorizationCode_uin_Invalid_acceptedClaims_Neg | Authorization code request with invalid accepted claims UIN | 00:00:00 | |
| ESignet_AuthorizationCode_uin_Invalid_requestTime_Neg | Authorization code request with invalid requestTime UIN | 00:00:00 | |
| ESignet_AuthorizationCode_uin_Missing_Claims_Pos | Authorization code request without claims UIN | 00:00:00 | |
| ESignet_AuthorizationCode_uin_Missing_TransactionId_Neg | Authorization code request without transactionId UIN | 00:00:00 | |
| ESignet_AuthorizationCode_uin_Null_PermittedAuthorizeScopes_Neg | Authorization code request with Null in PermittedAuthorizeScopes UIN | 00:00:00 | |
| ESignet_AuthorizationCode_uin_Null_TransactionId_Neg | Authorization code request with Null in transactionId UIN | 00:00:00 | |
| ESignet_AuthorizationCode_uin_Null_acceptedClaims_Neg | Authorization code request with Null in accepted claims UIN | 00:00:00 | |
| GenerateToken — Ignored | |||
| ESignet_GenerateToken_Vid_Empty_ClientAssertionType_Neg | Generate token with empty value in ClientAssertionType VID | 00:00:00 | |
| ESignet_GenerateToken_Vid_Empty_ClientAssertion_Neg | Generate token with empty value in ClientAssertion VID | 00:00:00 | |
| ESignet_GenerateToken_Vid_Empty_ClientId_Neg | Generate token with empty value in ClientId VID | 00:00:00 | |
| ESignet_GenerateToken_Vid_Empty_Code_Neg | Generate token with empty value in code VID | 00:00:00 | |
| ESignet_GenerateToken_Vid_Empty_Grant_type_Neg | Generate token with empty value in grant_type VID | 00:00:00 | |
| ESignet_GenerateToken_Vid_Empty_Redirect_uri_Neg | Generate token with empty value in redirect uri VID | 00:00:00 | |
| ESignet_GenerateToken_Vid_Incorrect_ClientAssertionType_Neg | Generate token with incorrect ClientAssertionType VID | 00:00:00 | |
| ESignet_GenerateToken_Vid_Invalid_ClientAssertionType_Neg | Generate token with invalid ClientAssertionType VID | 00:00:00 | |
| ESignet_GenerateToken_Vid_Invalid_ClientAssertion_Neg | Generate token with invalid ClientAssertion VID | 00:00:00 | |
| ESignet_GenerateToken_Vid_Invalid_ClientId_Neg | Generate token with invalid ClientId VID | 00:00:00 | |
| ESignet_GenerateToken_Vid_Invalid_Code_Neg | Generate token with invalid code VID | 00:00:00 | |
| ESignet_GenerateToken_Vid_Invalid_Grant_type_Neg | Generate token with invalid grant_type VID | 00:00:00 | |
| ESignet_GenerateToken_Vid_Invalid_Redirect_uri_Neg | Generate token with invalid redirect uri VID | 00:00:00 | |
| ESignet_GenerateToken_Vid_Missing_ClientAssertionType_Neg | Generate token without ClientAssertionType VID | 00:00:00 | |
| ESignet_GenerateToken_Vid_Missing_ClientAssertion_Neg | Generate token without ClientAssertion VID | 00:00:00 | |
| ESignet_GenerateToken_Vid_Missing_ClientId_Neg | Generate token without ClientId VID | 00:00:00 | |
| ESignet_GenerateToken_Vid_Missing_Code_Neg | Generate token without code VID | 00:00:00 | |
| ESignet_GenerateToken_Vid_Missing_Grant_type_Neg | Generate token without grant_type VID | 00:00:00 | |
| ESignet_GenerateToken_Vid_Missing_Redirect_uri_Neg | Generate token without redirect uri VID | 00:00:00 | |
| ESignet_GenerateToken_Vid_Null_ClientAssertionType_Neg | Generate token with Null in ClientAssertionType VID | 00:00:00 | |
| ESignet_GenerateToken_Vid_Null_ClientAssertion_Neg | Generate token with Null in ClientAssertion VID | 00:00:00 | |
| ESignet_GenerateToken_Vid_Null_ClientId_Neg | Generate token with Null in ClientId VID | 00:00:00 | |
| ESignet_GenerateToken_Vid_Null_Code_Neg | Generate token with Null in code VID | 00:00:00 | |
| ESignet_GenerateToken_Vid_Null_Grant_type_Neg | Generate token with Null in grant_type VID | 00:00:00 | |
| ESignet_GenerateToken_Vid_Null_Redirect_uri_Neg | Generate token with Null in redirect uri VID | 00:00:00 | |
| ESignet_GenerateToken_Vid_SpaceFirst_ClientAssertionType_Neg | Generate token with space in the beginning of ClientAssertionType VID | 00:00:00 | |
| ESignet_GenerateToken_Vid_SpaceFirst_Grant_type_Neg | Generate token with space in the beginning of grant_type VID | 00:00:00 | |
| ESignet_GenerateToken_Vid_SpaceLast_ClientAssertionType_Neg | Generate token with space in the end of ClientAssertionType VID | 00:00:00 | |
| ESignet_GenerateToken_Vid_SpaceLast_Grant_type_Neg | Generate token with space in the end of grant_type VID | 00:00:00 | |
| ESignet_GenerateToken_Vid_Used_Code_Neg | Generate token with used code VID | 00:00:00 | |
| ESignet_GenerateToken_Vid_Valid_Smoke_sid | Generate token with all valid details VID | 00:00:00 | |
| GenerateToken — Passed | |||
| ESignet_GenerateToken_uin_Empty_ClientAssertionType_Neg | Generate token with empty value in client assertion type UIN | 00:00:00 | |
| ESignet_GenerateToken_uin_Empty_ClientAssertion_Neg | Generate token with empty value in client assertion UIN | 00:00:00 | |
| ESignet_GenerateToken_uin_Empty_ClientId_Neg | Generate token with empty value in ClientId UIN | 00:00:00 | |
| ESignet_GenerateToken_uin_Empty_Code_Neg | Generate token with empty value in code UIN | 00:00:00 | |
| ESignet_GenerateToken_uin_Empty_Grant_type_Neg | Generate token with empty grant_type UIN | 00:00:00 | |
| ESignet_GenerateToken_uin_Empty_Redirect_uri_Neg | Generate token with empty value in redirect uri UIN | 00:00:00 | |
| ESignet_GenerateToken_uin_Incorrect_ClientAssertionType_Neg | Generate token with incorrect client assertion type UIN | 00:00:00 | |
| ESignet_GenerateToken_uin_Invalid_ClientAssertionType_Neg | Generate token with invalid client assertion type UIN | 00:00:00 | |
| ESignet_GenerateToken_uin_Invalid_ClientAssertion_Neg | Generate token with invalid client assertion UIN | 00:00:00 | |
| ESignet_GenerateToken_uin_Invalid_ClientId_Neg | Generate token with invalid ClientId UIN | 00:00:00 | |
| ESignet_GenerateToken_uin_Invalid_Code_Neg | Generate token with invalid code UIN | 00:00:00 | |
| ESignet_GenerateToken_uin_Invalid_Grant_type_Neg | Generate token with invalid grant_type UIN | 00:00:00 | |
| ESignet_GenerateToken_uin_Invalid_Redirect_uri_Neg | Generate token with invalid redirect uri UIN | 00:00:00 | |
| ESignet_GenerateToken_uin_Missing_ClientAssertionType_Neg | Generate token without client assertion type UIN | 00:00:00 | |
| ESignet_GenerateToken_uin_Missing_ClientAssertion_Neg | Generate token without client assertion UIN | 00:00:00 | |
| ESignet_GenerateToken_uin_Missing_ClientId_Neg | Generate token without ClientId UIN | 00:00:00 | |
| ESignet_GenerateToken_uin_Missing_Code_Neg | Generate token without code UIN | 00:00:00 | |
| ESignet_GenerateToken_uin_Missing_Grant_type_Neg | Generate token without grant_type UIN | 00:00:00 | |
| ESignet_GenerateToken_uin_Missing_Redirect_uri_Neg | Generate token without redirect uri UIN | 00:00:00 | |
| ESignet_GenerateToken_uin_Null_ClientAssertionType_Neg | Generate token with Null in client assertion type UIN | 00:00:00 | |
| ESignet_GenerateToken_uin_Null_ClientAssertion_Neg | Generate token with Null in client assertion UIN | 00:00:00 | |
| ESignet_GenerateToken_uin_Null_ClientId_Neg | Generate token with Null in ClientId UIN | 00:00:00 | |
| ESignet_GenerateToken_uin_Null_Code_Neg | Generate token with Null in code UIN | 00:00:00 | |
| ESignet_GenerateToken_uin_Null_Grant_type_Neg | Generate token with Null in grant_type UIN | 00:00:00 | |
| ESignet_GenerateToken_uin_Null_Redirect_uri_Neg | Generate token with Null in redirect uri UIN | 00:00:00 | |
| ESignet_GenerateToken_uin_SpaceFirst_ClientAssertionType_Neg | Generate token with space in the beginning of client assertion type UIN | 00:00:00 | |
| ESignet_GenerateToken_uin_SpaceFirst_Grant_type_Neg | Generate token with space in the beginning of grant_type UIN | 00:00:00 | |
| ESignet_GenerateToken_uin_SpaceLast_ClientAssertionType_Neg | Generate token with space in the end of client assertion type UIN | 00:00:00 | |
| ESignet_GenerateToken_uin_SpaceLast_Grant_type_Neg | Generate token with space in the end of grant_type UIN | 00:00:00 | |
| ESignet_GenerateToken_uin_Used_Code_Neg | Generate token with used code UIN | 00:00:00 | |
| ESignet_GenerateToken_uin_Valid_Smoke_sid | Generate token with all valid details UIN | 00:00:00 | |
| GetOidcUserInfo — Ignored | |||
| ESignet_GetOidcUserInfo_Vid_IdpAccessToken_StatusCode_Invalid_Token_Neg | Get OIDC user info with invalid token VID | 00:00:00 | |
| ESignet_GetOidcUserInfo_Vid_IdpAccessToken_StatusCode_Valid_Smoke_sid | Get OIDC user info with all valid details VID | 00:00:00 | |
| GetOidcUserInfo — Passed | |||
| ESignet_GetOidcUserInfo_uin_IdpAccessToken_StatusCode_Invalid_Token_Neg | Get OIDC user info with invalid token UIN | 00:00:00 | |
| ESignet_GetOidcUserInfo_uin_IdpAccessToken_StatusCode_Valid_Smoke_sid | Get OIDC user info with all valid details UIN | 00:00:00 | |
| CreateOIDCClient — Ignored | |||
| ESignet_CreateOIDCClient_StatusCode_Diff_Token_Neg | To create OIDC Client with different invalid token | 00:00:00 | |
| CreateOIDCClient — Passed | |||
| ESignet_CreateOIDCClient_2_Same_RelyParty_Valid_Smoke_sid | To create OIDC Client with two same relying party | 00:00:00 | |
| ESignet_CreateOIDCClient_Diff_RequestTime_Neg | To create OIDC Client with different requestTime | 00:00:00 | |
| ESignet_CreateOIDCClient_Empty_authContextRefs | To create OIDC Client with missing authContextRefs | 00:00:00 | |
| ESignet_CreateOIDCClient_Empty_clientAuthMethods_Neg | To create OIDC Client with an empty clientAuthMethods | 00:00:00 | |
| ESignet_CreateOIDCClient_Empty_grantTypes_Neg | To create OIDC Client with an empty grantTypes | 00:00:00 | |
| ESignet_CreateOIDCClient_Exceding_Range_ClientId_Neg | To create OIDC Client with exceding range clientId | 00:00:00 | |
| ESignet_CreateOIDCClient_Exceding_Range_ClientName_Neg | To create OIDC Client with exceding range clientName | 00:00:00 | |
| ESignet_CreateOIDCClient_Invalid_Exceding_Range_logoUri_Neg | To create OIDC Client with exceding range logoUri | 00:00:00 | |
| ESignet_CreateOIDCClient_Invalid_Exceding_Range_relyingPartyId_Neg | To create OIDC Client with exceding range relyingpartyId | 00:00:00 | |
| ESignet_CreateOIDCClient_Invalid_Range_ClientId_Neg | To create OIDC Client with invalid range clientId | 00:00:00 | |
| ESignet_CreateOIDCClient_Invalid_Range_ClientName_Neg | To create OIDC Client with invalid range clientName | 00:00:00 | |
| ESignet_CreateOIDCClient_Invalid_Range_logoUri_Neg | To create OIDC Client with invalid range logoUri | 00:00:00 | |
| ESignet_CreateOIDCClient_Invalid_Range_relyingPartyId_Neg | To create OIDC Client with invalid range relyingpartyId | 00:00:00 | |
| ESignet_CreateOIDCClient_Invalid_RequestTime_Neg | To create OIDC Client with invalid requestTime and all valid data | 00:00:00 | |
| ESignet_CreateOIDCClient_Invalid_SpaceFirst_ClientId_Neg | To create OIDC Client with a value starting with space in clientId | 00:00:00 | |
| ESignet_CreateOIDCClient_Invalid_SpaceLast_ClientId_Neg | To create OIDC Client with a value ending with space in clientId | 00:00:00 | |
| ESignet_CreateOIDCClient_Invalid_SpaceMiddle_ClientId_Neg | To create OIDC Client with clientId value having space in middle | 00:00:00 | |
| ESignet_CreateOIDCClient_Invalid_UserClaims | To create OIDC Client with invalid userClaims | 00:00:01 | |
| ESignet_CreateOIDCClient_Invalid_authContextRefs | To create OIDC Client with invaid authContextRefs | 00:00:00 | |
| ESignet_CreateOIDCClient_Invalid_clientAuthMethods_Neg | To create OIDC Client with different invalid clientAuthMethods | 00:00:01 | |
| ESignet_CreateOIDCClient_Invalid_grantTypes_Neg | To create OIDC Client with different invalid grantTypes | 00:00:00 | |
| ESignet_CreateOIDCClient_Invalid_publicKey | To create OIDC Client with invalid publicKey | 00:00:00 | |
| ESignet_CreateOIDCClient_Missing_authContextRefs | To create OIDC Client with missing authContextRefs | 00:00:01 | |
| ESignet_CreateOIDCClient_Missing_clientAuthMethods_Neg | To create OIDC Client with missing clientAuthMethods | 00:00:00 | |
| ESignet_CreateOIDCClient_Missing_grantTypes_Neg | To create OIDC Client with missing grantTypes | 00:00:01 | |
| ESignet_CreateOIDCClient_Missing_redirectUris | To create OIDC Client with with missing redirectUris | 00:00:00 | |
| ESignet_CreateOIDCClient_Null_authContextRefs | To create OIDC Client with null value in authContextRefs | 00:00:00 | |
| ESignet_CreateOIDCClient_Null_clientAuthMethods_Neg | To create OIDC Client with null value in clientAuthMethods | 00:00:00 | |
| ESignet_CreateOIDCClient_Null_grantTypes_Neg | To create OIDC Client with null value in grantTypes | 00:00:00 | |
| ESignet_CreateOIDCClient_StatusCode_Invalid_Token_Neg | To create OIDC Client with invalid token | 00:00:00 | |
| ESignet_CreateOIDCClient_all_Valid_Smoke_sid | To create OIDC Client with all valid data | 00:00:01 | |
| UpdateOIDCClient — Ignored | |||
| ESignet_UpdateOIDCClient_StatusCode_Diff_Token_Neg | To update OIDC client with different invalid token | 00:00:00 | |
| UpdateOIDCClient — Passed | |||
| ESignet_UpdateOIDCClient_2_all_Valid_Smoke | To update OIDC client with different valid data | 00:00:00 | |
| ESignet_UpdateOIDCClient_Diff_RequestTime_Neg | To update OIDC client with different invalid requestTime | 00:00:00 | |
| ESignet_UpdateOIDCClient_Empty_authContextRefs_Neg | To update OIDC client with an empty authContextRefs | 00:00:00 | |
| ESignet_UpdateOIDCClient_Empty_clientAuthMethods_Neg | To update OIDC client with empty clientAuthMethods | 00:00:00 | |
| ESignet_UpdateOIDCClient_Empty_grantTypes_Neg | To update OIDC client with an empty grantTypes | 00:00:00 | |
| ESignet_UpdateOIDCClient_Empty_redirectUris_Neg | To update OIDC client with an empty redirectUris | 00:00:00 | |
| ESignet_UpdateOIDCClient_Exceding_Range_ClientId_Neg | To update OIDC client with exceding range clientId | 00:00:00 | |
| ESignet_UpdateOIDCClient_Exceding_Range_ClientName | To update OIDC client with exceding range clientName | 00:00:00 | |
| ESignet_UpdateOIDCClient_Exceding_Range_logoUri_Neg | To update OIDC client with exceding range logoUri | 00:00:00 | |
| ESignet_UpdateOIDCClient_Invalid_Range_ClientId_Neg | To update OIDC client with invalid range | 00:00:00 | |
| ESignet_UpdateOIDCClient_Invalid_Range_ClientName | To update OIDC client with all invalid range clientName | 00:00:00 | |
| ESignet_UpdateOIDCClient_Invalid_Range_logoUri_Neg | To update OIDC client with invalid range logoUri | 00:00:00 | |
| ESignet_UpdateOIDCClient_Invalid_RequestTime_Neg | To update OIDC client with invalid requestTime | 00:00:00 | |
| ESignet_UpdateOIDCClient_Invalid_authContextRefs_Neg | To update OIDC client with invalid authContextRefs | 00:00:00 | |
| ESignet_UpdateOIDCClient_Invalid_clientAuthMethods_Neg | To update OIDC client with invalid clientAuthMethods | 00:00:00 | |
| ESignet_UpdateOIDCClient_Invalid_clientId_Neg | To update OIDC client with invalid clientId | 00:00:00 | |
| ESignet_UpdateOIDCClient_Invalid_grantTypes_Neg | To update OIDC client with invalid grantTypes | 00:00:00 | |
| ESignet_UpdateOIDCClient_Invalid_status_Neg | To update OIDC client with invalid status | 00:00:00 | |
| ESignet_UpdateOIDCClient_Invalid_userClaims_Neg | To update OIDC client with invalid userClaims | 00:00:00 | |
| ESignet_UpdateOIDCClient_Missing_authContextRefs_Neg | To update OIDC client with missing authContextRefs | 00:00:00 | |
| ESignet_UpdateOIDCClient_Missing_clientAuthMethods_Neg | To update OIDC client with missing clientAuthMethods | 00:00:00 | |
| ESignet_UpdateOIDCClient_Missing_grantTypes_Neg | To update OIDC client with missing grantTypes | 00:00:00 | |
| ESignet_UpdateOIDCClient_Missing_redirectUris_Neg | To update OIDC client with missing redirectUris | 00:00:00 | |
| ESignet_UpdateOIDCClient_Null_authContextRefs_Neg | To update OIDC client with null authContextRefs | 00:00:00 | |
| ESignet_UpdateOIDCClient_Null_clientAuthMethods_Neg | To update OIDC client with null value in clientAuthMethods | 00:00:00 | |
| ESignet_UpdateOIDCClient_Null_grantTypes_Neg | To update OIDC client with null grantTypes | 00:00:00 | |
| ESignet_UpdateOIDCClient_StatusCode_Invalid_Token_Neg | To update OIDC client with invalid token | 00:00:00 | |
| ESignet_UpdateOIDCClient_all_Valid_Smoke | To update OIDC client with all valid data | 00:00:00 | |
| CreateOIDCClientV2 — Passed | |||
| ESignet_CreateOIDCClientV2_Invalid_clientNameLang_Neg | To create OIDC Client V2 with invalid clientNameLang | 00:00:00 | |
| ESignet_CreateOIDCClientV2_Invalid_langCode_Neg | To create OIDC Client V2 with invalid language code | 00:00:00 | |
| ESignet_CreateOIDCClientV2_Invalid_langCode_Size_Neg | To create OIDC Client V2 with invalid language code size | 00:00:00 | |
| ESignet_CreateOIDCClientV2_Missing_ClientNamelangMap_Neg | To create OIDC Client V2 with missing ClientNamelangMap | 00:00:00 | |
| ESignet_CreateOIDCClientV2_Missing_ClientNamelangMap_Value_Neg | To create OIDC Client V2 with missing clientNameLangMap value | 00:00:00 | |
| ESignet_CreateOIDCClientV2_all_Valid_Smoke_sid | To create OIDC Client V2 with all valid data | 00:00:00 | |
| UpdateOIDCClientV2 — Passed | |||
| ESignet_UpdateOIDCClientV2_Invalid_clientNameLang_Neg | To update OIDC Client V2 with invalid clientNameLang | 00:00:00 | |
| ESignet_UpdateOIDCClientV2_Invalid_langCode_Neg | To update OIDC Client V2 with invalid language code | 00:00:00 | |
| ESignet_UpdateOIDCClientV2_Invalid_langCode_Size_Neg | To update OIDC Client V2 with invalid language code size | 00:00:00 | |
| ESignet_UpdateOIDCClientV2_Missing_ClientNamelangMap_Neg | To update OIDC Client V2 with missing clientNamelangMap | 00:00:00 | |
| ESignet_UpdateOIDCClientV2_Missing_ClientNamelangMap_Value_Neg | To update OIDC Client V2 with missing clientNamelangMap value | 00:00:00 | |
| ESignet_UpdateOIDCClientV2_all_Valid_Smoke | To update OIDC Client V2 with all valid data | 00:00:00 | |
| OAuthDetailsRequestV2 — Passed | |||
| ESignet_OAuthDetailsRequest_V2_uin_1stLang_all_Valid_Smoke_sid | To get OAuthDetails V2 with first language and all valid data | 00:00:00 | |
| ESignet_OAuthDetailsRequest_V2_uin_all_Valid_Smoke_sid | To get OAuthDetails V2 with all valid data | 00:00:00 | |
| CreatePolicySunBirdR — Ignored | |||
| ESignet_SunBirdR_CreatePolicy_NOAUTH_Valid_Smoke_Sid | To create a Policy for SunBirdR with all valid data and with no authorization | 00:00:00 | |
| GetPolicySunBirdR — Ignored | |||
| ESignet_SunBirdR_GetPolicy_NOAUTH_Valid_Smoke | To delete policy for SunBirdR with no authorization | 00:00:00 | |
| SearchPolicySunBirdR — Ignored | |||
| ESignet_SunBirdR_SearchPolicy_NOAUTH_Valid_Smoke | To Search for the Policy with the policynumber and with no Authorization | 00:00:00 | |
| CreateOIDCClientV2SunBirdC — Ignored | |||
| ESignet_CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid | To create OIDCClientV2 for SunbirdC with all valid data | 00:00:00 | |
| OAuthDetailsRequestSunBirdC — Ignored | |||
| ESignet_OAuthDetailsRequest_SunBirdC_all_Valid_Smoke_sid | To Request OAuthDetails for SunBirdC with all valid data | 00:00:00 | |
| AuthenticateUserSunBirdC — Ignored | |||
| ESignet_AuthenticateUserSunBirdC_Valid_Smoke | To Authenticate the User for SunBirdC with all valid data | 00:00:00 | |
| AuthorizationCodeSunBirdC — Ignored | |||
| ESignet_AuthorizationCode_SunBirdC_All_Valid_Smoke_sid | To Authorize the user for SunBirdC with all valid data | 00:00:00 | |
| GenerateTokenSunBirdC — Ignored | |||
| ESignet_GenerateTokenSunBirdC_Valid_Smoke_sid | To Generate token for SunBirdC with all valid data | 00:00:00 | |
| OAuthDetailsRequestSunBirdCNegTC — Ignored | |||
| ESignet_OAuthDetailsRequest_SunBirdCNegTC_Scen1_AuthCode_Valid_Smoke_sid | To request OAuthDetails for SunBirdC with invalid AuthCode | 00:00:00 | |
| ESignet_OAuthDetailsRequest_SunBirdCNegTC_Scen1_Valid_Smoke_sid | To request OAuthDetails for SunBirdC with invalid data | 00:00:00 | |
| ESignet_OAuthDetailsRequest_SunBirdCNegTC_Scen2_AuthCode_Valid_Smoke_sid | To request OAuthDetails for SunBirdC with different different invalid AuthCode | 00:00:00 | |
| ESignet_OAuthDetailsRequest_SunBirdCNegTC_Scen2_Valid_Smoke_sid | To request OAuthDetails for SunBirdC with different invalid data | 00:00:00 | |
| ESignet_OAuthDetailsRequest_SunBirdCNegTC_Scen3_AuthCode_Valid_Smoke_sid | To request OAuthDetails for SunBirdC with different invalid AuthCode | 00:00:00 | |
| ESignet_OAuthDetailsRequest_SunBirdCNegTC_Scen3_Valid_Smoke_sid | To request OAuthDetails for SunBirdC with different invalid data | 00:00:00 | |
| ESignet_OAuthDetailsRequest_SunBirdCNegTC_Scen4_AuthCode_Valid_Smoke_sid | To request OAuthDetails for SunBirdC with different invalid Authcode | 00:00:00 | |
| ESignet_OAuthDetailsRequest_SunBirdCNegTC_Scen4_Valid_Smoke_sid | To request OAuthDetails for SunBirdC with different invalid data | 00:00:00 | |
| ESignet_OAuthDetailsRequest_SunBirdCNegTC_Scen5_AuthCode_Valid_Smoke_sid | To request OAuthDetails for SunBirdC with different invalid data | 00:00:00 | |
| ESignet_OAuthDetailsRequest_SunBirdCNegTC_Scen5_Valid_Smoke_sid | To request OAuthDetails for SunBirdC with different invalid data | 00:00:00 | |
| ESignet_OAuthDetailsRequest_SunBirdCNegTC_Scen6_AuthCode_Valid_Smoke_sid | To request OAuthDetails for SunBirdC with different invalid data | 00:00:00 | |
| ESignet_OAuthDetailsRequest_SunBirdCNegTC_Scen6_Valid_Smoke_sid | To request OAuthDetails for SunBirdC with different invalid data | 00:00:00 | |
| ESignet_OAuthDetailsRequest_SunBirdCNegTC_Scen7_AuthCode_Valid_Smoke_sid | To request OAuthDetails for SunBirdC with different invalid data | 00:00:00 | |
| ESignet_OAuthDetailsRequest_SunBirdCNegTC_Scen8_AuthCode_Valid_Smoke_sid | To request OAuthDetails for SunBirdC with different invalid data | 00:00:00 | |
| ESignet_OAuthDetailsRequest_SunBirdCNegTC_all_Valid_Smoke_sid | To request OAuthDetails for SunBirdC with invalid data | 00:00:00 | |
| ESignet_OAuthDetailsRequest_SunBirdC_With_only_challenge_method | To request OAuthDetails for SunBirdC with only challenge method | 00:00:00 | |
| ESignet_OAuthDetailsRequest_SunBirdC_With_only_code_challenge_with_scope | To request OAuthDetails for SunBirdC with only codeChallenge with scope | 00:00:00 | |
| ESignet_OAuthDetailsRequest_SunBirdC_all_Valid_Smoke_with_other_acrs | To request OAuthDetails for SunBirdC with all valid dataand with other acrs | 00:00:00 | |
| ESignet_OAuthDetailsRequest_SunBirdC_with_empty_challenege_data | To request OAuthDetails for SunBirdC with an empty codeChallenge data | 00:00:00 | |
| ESignet_OAuthDetailsRequest_SunBirdC_with_invalid_challenege_method | To request OAuthDetails for SunBirdC with invalid codeChallengeMethod | 00:00:00 | |
| ESignet_OAuthDetailsRequest_SunBirdC_with_invalid_scope_data | To request OAuthDetails for SunBirdC with invalid scope value | 00:00:00 | |
| ESignet_OAuthDetailsRequest_SunBirdC_with_lengthy_codeChallenege_data | To request OAuthDetails for SunBirdC with lenghty codeChallenge data | 00:00:00 | |
| ESignet_OAuthDetailsRequest_SunBirdC_with_opeind_scope_data | To request OAuthDetails for SunBirdC with openid scope data | 00:00:00 | |
| ESignet_OAuthDetailsRequest_SunBirdC_with_openid_profile_sunbird_data_Pos | To request OAuthDetails for SunBirdC with openid profile sunbird value in scope | 00:00:00 | |
| ESignet_OAuthDetailsRequest_SunBirdC_with_random_codeChallenege_data | To request OAuthDetails for SunBirdC with random codeChallenge data | 00:00:00 | |
| ESignet_OAuthDetailsRequest_SunBirdC_without_codeChallenege_and_with_sunbirdc_scope | To request OAuthDetails for SunBirdC with sunbirdc scope | 00:00:00 | |
| ESignet_OAuthDetailsRequest_SunBirdC_without_scope | To request OAuthDetails for SunBirdC with all valid data and without scope | 00:00:00 | |
| ESignet_OAuthDetailsRequest_SunBirdC_without_scope_data | To request OAuthDetails for SunBirdC with all valid data and without scope data | 00:00:00 | |
| AuthenticateUserSunBirdCNegTC — Ignored | |||
| ESignet_AuthenticateUserSunBirdCNegTC_Diff_Format1_Neg | To Authenticate the user for SunBirdC with different invalid formats | 00:00:00 | |
| ESignet_AuthenticateUserSunBirdCNegTC_Diff_Format2_Neg | To Authenticate the user for SunBirdC with different invalid formats | 00:00:00 | |
| ESignet_AuthenticateUserSunBirdCNegTC_Diff_Format3_Neg | To Authenticate the user for SunBirdC with different invalid formats | 00:00:00 | |
| ESignet_AuthenticateUserSunBirdCNegTC_Diff_Format4_Neg | To Authenticate the user for SunBirdC with different invalid formats | 00:00:00 | |
| ESignet_AuthenticateUserSunBirdCNegTC_Empty_AuthFactorType_Neg | To Authenticate the user for SunBirdC with an empty authFactorType | 00:00:00 | |
| ESignet_AuthenticateUserSunBirdCNegTC_Empty_Challenge_Neg | To Authenticate the user for SunBirdC with an empty challenge | 00:00:00 | |
| ESignet_AuthenticateUserSunBirdCNegTC_Empty_Format_Neg | To Authenticate the user for SunBirdC with an empty challenge | 00:00:00 | |
| ESignet_AuthenticateUserSunBirdCNegTC_Empty_PolicyNum_Neg | To Authenticate the user for SunBirdC with an empty policy number | 00:00:00 | |
| ESignet_AuthenticateUserSunBirdCNegTC_Empty_TransactionID_Neg | To Authenticate the user for SunBirdC with an empty transactionId | 00:00:00 | |
| ESignet_AuthenticateUserSunBirdCNegTC_Expired_TransactionID_Neg | To Authenticate the user for SunBirdC with an expired transactionId | 00:00:00 | |
| ESignet_AuthenticateUserSunBirdCNegTC_Invalid_AuthFactorType_Neg | To Authenticate the user for SunBirdC with invalid authFactorType | 00:00:00 | |
| ESignet_AuthenticateUserSunBirdCNegTC_Invalid_Challenge_Neg | To Authenticate the user for SunBirdC with an invalid challenge | 00:00:00 | |
| ESignet_AuthenticateUserSunBirdCNegTC_Invalid_Encoded_Challenge_Neg | To Authenticate the user for SunBirdC with invalid encoded challenge | 00:00:00 | |
| ESignet_AuthenticateUserSunBirdCNegTC_Invalid_Format_Neg | To Authenticate the user for SunBirdC with invalid format | 00:00:00 | |
| ESignet_AuthenticateUserSunBirdCNegTC_Invalid_PolicyNum_Neg | To Authenticate the user for SunBirdC with invalid policy number | 00:00:00 | |
| ESignet_AuthenticateUserSunBirdCNegTC_Invalid_TransactionID_Neg | To Authenticate the user for SunBirdC with invalid transactionId | 00:00:00 | |
| ESignet_AuthenticateUserSunBirdCNegTC_Missing_AuthFactorType_Neg | To Authenticate the user for SunBirdC with missing authFactorType | 00:00:00 | |
| ESignet_AuthenticateUserSunBirdCNegTC_Missing_Challenge_Neg | To Authenticate the user for SunBirdC with missing challenge | 00:00:00 | |
| ESignet_AuthenticateUserSunBirdCNegTC_Missing_Format_Neg | To Authenticate the user for SunBirdC with an empty challenge | 00:00:00 | |
| ESignet_AuthenticateUserSunBirdCNegTC_Missing_PolicyNum_Neg | To Authenticate the user for SunBirdC with missing policy number | 00:00:00 | |
| ESignet_AuthenticateUserSunBirdCNegTC_Missing_TransactionID_Neg | To Authenticate the user for SunBirdC with missing transactionId | 00:00:00 | |
| ESignet_AuthenticateUserSunBirdCNegTC_Null_AuthFactorType_Neg | To Authenticate the user for SunBirdC with null value in authFactorType | 00:00:00 | |
| ESignet_AuthenticateUserSunBirdCNegTC_Null_Challenge_Neg | To Authenticate the user for SunBirdC with null value in challenge | 00:00:00 | |
| ESignet_AuthenticateUserSunBirdCNegTC_Null_Format_Neg | To Authenticate the user for SunBirdC with null value in format | 00:00:00 | |
| ESignet_AuthenticateUserSunBirdCNegTC_Null_PolicyNum_Neg | To Authenticate the user for SunBirdC with null value in policy number | 00:00:00 | |
| ESignet_AuthenticateUserSunBirdCNegTC_Other_AuthFactorType_Neg | To Authenticate the user for SunBirdC with other authFactorType | 00:00:00 | |
| ESignet_AuthenticateUserSunBirdCNegTC_Random_Challenge_Neg | To Authenticate the user for SunBirdC with random challenge | 00:00:00 | |
| ESignet_AuthenticateUserSunBirdCNegTC_Scen1_AuthCode_Valid_Smoke | To Authenticate the user for SunBirdC with invalid authcode | 00:00:00 | |
| ESignet_AuthenticateUserSunBirdCNegTC_Scen2_AuthCode_Valid_Smoke | To Authenticate the user for SunBirdC with different invalid authcode | 00:00:00 | |
| ESignet_AuthenticateUserSunBirdCNegTC_Scen3_AuthCode_Valid_Smoke | To Authenticate the user for SunBirdC with different invalid authcode | 00:00:00 | |
| ESignet_AuthenticateUserSunBirdCNegTC_Scen4_AuthCode_Valid_Smoke | To Authenticate the user for SunBirdC with different invalid authcode | 00:00:00 | |
| ESignet_AuthenticateUserSunBirdCNegTC_Scen5_AuthCode_Valid_Smoke | To Authenticate the user for SunBirdC with different invalid authcode | 00:00:00 | |
| ESignet_AuthenticateUserSunBirdCNegTC_Scen6_AuthCode_Valid_Smoke | To Authenticate the user for SunBirdC with different invalid authcode | 00:00:00 | |
| ESignet_AuthenticateUserSunBirdCNegTC_Scen7_AuthCode_Valid_Smoke | To Authenticate the user for SunBirdC with different invalid authcode | 00:00:00 | |
| ESignet_AuthenticateUserSunBirdCNegTC_Scen8_AuthCode_Valid_Smoke | To Authenticate the user for SunBirdC with different invalid authcode | 00:00:00 | |
| ESignet_AuthenticateUserSunBirdCNegTC_SpaceVal_AuthFactorType_Neg | To Authenticate the user for SunBirdC with space value in authFactorType | 00:00:00 | |
| ESignet_AuthenticateUserSunBirdCNegTC_SpaceVal_Challenge_Neg | To Authenticate the user for SunBirdC with space value in challenge | 00:00:00 | |
| ESignet_AuthenticateUserSunBirdCNegTC_SpaceVal_Format_Neg | To Authenticate the user for SunBirdC with space value in format | 00:00:00 | |
| ESignet_AuthenticateUserSunBirdCNegTC_SpaceVal_PolicyNum_Neg | To Authenticate the user for SunBirdC with space value in policy number | 00:00:00 | |
| ESignet_AuthenticateUserSunBirdCNegTC_Used_TransactionID_Neg | To Authenticate the user for SunBirdC with already used transactionId | 00:00:00 | |
| ESignet_AuthenticateUserSunBirdCNegTC_Valid_Smoke | To Authenticate the user for SunBirdC with invalid data | 00:00:00 | |
| AuthorizationCodeSunBirdCNegTC — Ignored | |||
| ESignet_AuthorizationCode_SunBirdCNegTC_All_Valid_Smoke_sid | To Authenticate the user for SunBirdC with all valid data | 00:00:00 | |
| ESignet_AuthorizationCode_SunBirdCNegTC_Comma_Separated_Scope_Pos | To Authenticate the user for SunBirdC with comma separated scope | 00:00:00 | |
| ESignet_AuthorizationCode_SunBirdCNegTC_Diff_Scope2_Pos | To Authenticate the user for SunBirdC with multiple different scope | 00:00:00 | |
| ESignet_AuthorizationCode_SunBirdCNegTC_Diff_Scope_Pos | To Authenticate the user for SunBirdC with different scope | 00:00:00 | |
| ESignet_AuthorizationCode_SunBirdCNegTC_Empty_Scope_Neg | To Authenticate the user for SunBirdC with an empty scope | 00:00:00 | |
| ESignet_AuthorizationCode_SunBirdCNegTC_Invalid_Scope_Pos | To Authenticate the user for SunBirdC with invalid scope | 00:00:00 | |
| ESignet_AuthorizationCode_SunBirdCNegTC_Missing_Scope_Pos | To Authenticate the user for SunBirdC with missing scope | 00:00:00 | |
| ESignet_AuthorizationCode_SunBirdCNegTC_Null_Scope_Pos | To Authenticate the user for SunBirdC with null value in scope | 00:00:00 | |
| ESignet_AuthorizationCode_SunBirdCNegTC_SpaceVal_Scope_Neg | To Authenticate the user for SunBirdC with space value in scope | 00:00:00 | |
| GenerateTokenSunBirdCNegTC — Ignored | |||
| ESignet_GenerateTokenSunBirdCNegTC_Empty_Code_Verifier_Neg | To Authenticate the user for SunBirdC with an empty code_verifier value | 00:00:00 | |
| ESignet_GenerateTokenSunBirdCNegTC_Invalid_Code_Verifier_Neg | To Authenticate the user for SunBirdC with invalid code_verifier | 00:00:00 | |
| ESignet_GenerateTokenSunBirdCNegTC_Missing_Code_Verifier_Neg | To Authenticate the user for SunBirdC with missing code_verifier | 00:00:00 | |
| ESignet_GenerateTokenSunBirdCNegTC_Null_Code_Verifier_Neg | To Authenticate the user for SunBirdC with null value in code_verifier | 00:00:00 | |
| ESignet_GenerateTokenSunBirdCNegTC_SpaceVal_Code_Verifier_Neg | To Authenticate the user for SunBirdC with space value in code_verifier | 00:00:00 | |
| ESignet_GenerateTokenSunBirdCNegTC_Valid_Smoke_sid | To Authenticate the user for SunBirdC with invalid data | 00:00:00 | |
| DeletePolicySunBirdR — Ignored | |||
| ESignet_SunBirdR_DeletePolicy_NOAUTH_Valid_Smoke | To delete policy for SunBirdR with no authorization | 00:00:00 | |
| Testcase Input |
|---|
| testCaseName=ESignet_AddIdentity_BioAuth_smoke_Pos, endPoint=/v1/mock-identity-system/identity, role=idrepo, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "individualId": "$RANDOMINDIVIDUALIDFORMOCKIDENTITY$", "pin": "545411", "email": "$EMAILIDFORMOCKIDENTITY$", "password": "$PASSWORDFORMOCKIDENTITY$", "phone": "$PHONEFORMOCKIDENTITY$" }, output={ "status":"mock identity data created successfully" }, inputTemplate=esignet/AddIdentityMock/AddIdentity, outputTemplate=esignet/AddIdentityMock/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with BioAuth, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:259)
at io.mosip.testrig.apirig.esignet.testscripts.AddIdentity.test(AddIdentity.java:90)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AddIdentity_Consent_Vid_smoke_Pos, endPoint=/v1/mock-identity-system/identity, role=idrepo, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "individualId": "$RANDOMINDIVIDUALIDFORMOCKIDENTITY$", "pin": "545411", "email": "$EMAILIDFORMOCKIDENTITY$", "password": "$PASSWORDFORMOCKIDENTITY$", "phone": "$PHONEFORMOCKIDENTITY$" }, output={ "status":"mock identity data created successfully" }, inputTemplate=esignet/AddIdentityMock/AddIdentity, outputTemplate=esignet/AddIdentityMock/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity consent Vid, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AddIdentity_Consent_smoke_Pos, endPoint=/v1/mock-identity-system/identity, role=idrepo, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "individualId": "$RANDOMINDIVIDUALIDFORMOCKIDENTITY$", "pin": "545411", "email": "$EMAILIDFORMOCKIDENTITY$", "password": "$PASSWORDFORMOCKIDENTITY$", "phone": "$PHONEFORMOCKIDENTITY$" }, output={ "status":"mock identity data created successfully" }, inputTemplate=esignet/AddIdentityMock/AddIdentity, outputTemplate=esignet/AddIdentityMock/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity consent, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AddIdentity_Invalid_Scen_smoke_Pos, endPoint=/v1/mock-identity-system/identity, role=idrepo, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "individualId": "$RANDOMINDIVIDUALIDFORMOCKIDENTITY$", "pin": "545411", "email": "$EMAILIDFORMOCKIDENTITY$", "password": "$PASSWORDFORMOCKIDENTITY$", "phone": "$PHONEFORMOCKIDENTITY$" }, output={ "status":"mock identity data created successfully" }, inputTemplate=esignet/AddIdentityMock/AddIdentity, outputTemplate=esignet/AddIdentityMock/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with invalid scenario, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AddIdentity_KycAuth_smoke_Pos, endPoint=/v1/mock-identity-system/identity, role=idrepo, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "individualId": "$RANDOMINDIVIDUALIDFORMOCKIDENTITY$", "pin": "545411", "email": "$EMAILIDFORMOCKIDENTITY$", "password": "$PASSWORDFORMOCKIDENTITY$", "phone": "$PHONEFORMOCKIDENTITY$" }, output={ "status":"mock identity data created successfully" }, inputTemplate=esignet/AddIdentityMock/AddIdentity, outputTemplate=esignet/AddIdentityMock/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with KycAuth, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AddIdentity_L2_Valid_Parameters_smoke_Neg_Pos, endPoint=/v1/mock-identity-system/identity, role=idrepo, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "individualId": "$RANDOMINDIVIDUALIDFORMOCKIDENTITY$", "pin": "545411", "email": "$EMAILIDFORMOCKIDENTITY$", "password": "$PASSWORDFORMOCKIDENTITY$", "phone": "$PHONEFORMOCKIDENTITY$" }, output={ "status":"mock identity data created successfully" }, inputTemplate=esignet/AddIdentityMock/AddIdentity, outputTemplate=esignet/AddIdentityMock/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with password authentication, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AddIdentity_L2_Valid_Parameters_smoke_Pos, endPoint=/v1/mock-identity-system/identity, role=idrepo, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "individualId": "$RANDOMINDIVIDUALIDFORMOCKIDENTITY$", "pin": "545411", "email": "$EMAILIDFORMOCKIDENTITY$", "password": "$PASSWORDFORMOCKIDENTITY$", "phone": "$PHONEFORMOCKIDENTITY$" }, output={ "status":"mock identity data created successfully" }, inputTemplate=esignet/AddIdentityMock/AddIdentity, outputTemplate=esignet/AddIdentityMock/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with password authentication, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AddIdentity_Linked_Consent_User2_Vid_smoke_Pos, endPoint=/v1/mock-identity-system/identity, role=idrepo, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "individualId": "$RANDOMINDIVIDUALIDFORMOCKIDENTITY$", "pin": "545411", "email": "$EMAILIDFORMOCKIDENTITY$", "password": "$PASSWORDFORMOCKIDENTITY$", "phone": "$PHONEFORMOCKIDENTITY$" }, output={ "status":"mock identity data created successfully" }, inputTemplate=esignet/AddIdentityMock/AddIdentity, outputTemplate=esignet/AddIdentityMock/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity linked consent user2 Vid, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AddIdentity_Linked_Consent_User2_smoke_Pos, endPoint=/v1/mock-identity-system/identity, role=idrepo, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "individualId": "$RANDOMINDIVIDUALIDFORMOCKIDENTITY$", "pin": "545411", "email": "$EMAILIDFORMOCKIDENTITY$", "password": "$PASSWORDFORMOCKIDENTITY$", "phone": "$PHONEFORMOCKIDENTITY$" }, output={ "status":"mock identity data created successfully" }, inputTemplate=esignet/AddIdentityMock/AddIdentity, outputTemplate=esignet/AddIdentityMock/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity linked consent user2, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AddIdentity_Linked_Consent_Vid_smoke_Pos, endPoint=/v1/mock-identity-system/identity, role=idrepo, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "individualId": "$RANDOMINDIVIDUALIDFORMOCKIDENTITY$", "pin": "545411", "email": "$EMAILIDFORMOCKIDENTITY$", "password": "$PASSWORDFORMOCKIDENTITY$", "phone": "$PHONEFORMOCKIDENTITY$" }, output={ "status":"mock identity data created successfully" }, inputTemplate=esignet/AddIdentityMock/AddIdentity, outputTemplate=esignet/AddIdentityMock/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity linked consent Vid, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AddIdentity_Linked_Consent_smoke_Pos, endPoint=/v1/mock-identity-system/identity, role=idrepo, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "individualId": "$RANDOMINDIVIDUALIDFORMOCKIDENTITY$", "pin": "545411", "email": "$EMAILIDFORMOCKIDENTITY$", "password": "$PASSWORDFORMOCKIDENTITY$", "phone": "$PHONEFORMOCKIDENTITY$" }, output={ "status":"mock identity data created successfully" }, inputTemplate=esignet/AddIdentityMock/AddIdentity, outputTemplate=esignet/AddIdentityMock/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity linked consent, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AddIdentity_Linked_Sce_smoke_Pos, endPoint=/v1/mock-identity-system/identity, role=idrepo, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "individualId": "$RANDOMINDIVIDUALIDFORMOCKIDENTITY$", "pin": "545411", "email": "$EMAILIDFORMOCKIDENTITY$", "password": "$PASSWORDFORMOCKIDENTITY$", "phone": "$PHONEFORMOCKIDENTITY$" }, output={ "status":"mock identity data created successfully" }, inputTemplate=esignet/AddIdentityMock/AddIdentity, outputTemplate=esignet/AddIdentityMock/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with valid parameters, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AddIdentity_Password_Auth_smoke_Pos, endPoint=/v1/mock-identity-system/identity, role=idrepo, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "individualId": "$RANDOMINDIVIDUALIDFORMOCKIDENTITY$", "pin": "545411", "email": "$EMAILIDFORMOCKIDENTITY$", "password": "$PASSWORDFORMOCKIDENTITY$", "phone": "$PHONEFORMOCKIDENTITY$" }, output={ "status":"mock identity data created successfully" }, inputTemplate=esignet/AddIdentityMock/AddIdentity, outputTemplate=esignet/AddIdentityMock/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with password authentication, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AddIdentity_Valid_Parameters_Sce2_smoke_Pos, endPoint=/v1/mock-identity-system/identity, role=idrepo, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "individualId": "$RANDOMINDIVIDUALIDFORMOCKIDENTITY$", "pin": "545411", "email": "$EMAILIDFORMOCKIDENTITY$", "password": "$PASSWORDFORMOCKIDENTITY$", "phone": "$PHONEFORMOCKIDENTITY$" }, output={ "status":"mock identity data created successfully" }, inputTemplate=esignet/AddIdentityMock/AddIdentity, outputTemplate=esignet/AddIdentityMock/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with all valid parameters, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AddIdentity_Valid_Parameters_smoke_Pos, endPoint=/v1/mock-identity-system/identity, role=idrepo, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "individualId": "$RANDOMINDIVIDUALIDFORMOCKIDENTITY$", "pin": "545411", "email": "$EMAILIDFORMOCKIDENTITY$", "password": "$PASSWORDFORMOCKIDENTITY$", "phone": "$PHONEFORMOCKIDENTITY$" }, output={ "status":"mock identity data created successfully" }, inputTemplate=esignet/AddIdentityMock/AddIdentity, outputTemplate=esignet/AddIdentityMock/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with all valid parameters, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AddIdentity_Valid_Params_BindOtp_smoke_Pos, endPoint=/v1/mock-identity-system/identity, role=idrepo, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "individualId": "$RANDOMINDIVIDUALIDFORMOCKIDENTITY$", "pin": "545411", "email": "$EMAILIDFORMOCKIDENTITY$", "password": "$PASSWORDFORMOCKIDENTITY$", "phone": "$PHONEFORMOCKIDENTITY$" }, output={ "status":"mock identity data created successfully" }, inputTemplate=esignet/AddIdentityMock/AddIdentity, outputTemplate=esignet/AddIdentityMock/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with all valid parameters, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AddIdentity_Valid_Params_VCI_Vid_Inv_Scen_smoke_Pos, endPoint=/v1/mock-identity-system/identity, role=idrepo, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "individualId": "$RANDOMINDIVIDUALIDFORMOCKIDENTITY$", "pin": "545411", "email": "$EMAILIDFORMOCKIDENTITY$", "password": "$PASSWORDFORMOCKIDENTITY$", "phone": "$PHONEFORMOCKIDENTITY$" }, output={ "status":"mock identity data created successfully" }, inputTemplate=esignet/AddIdentityMock/AddIdentity, outputTemplate=esignet/AddIdentityMock/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with valid parameters VCI Vid invalid scenario, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AddIdentity_Valid_Params_VCI_Vid_smoke_Pos, endPoint=/v1/mock-identity-system/identity, role=idrepo, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "individualId": "$RANDOMINDIVIDUALIDFORMOCKIDENTITY$", "pin": "545411", "email": "$EMAILIDFORMOCKIDENTITY$", "password": "$PASSWORDFORMOCKIDENTITY$", "phone": "$PHONEFORMOCKIDENTITY$" }, output={ "status":"mock identity data created successfully" }, inputTemplate=esignet/AddIdentityMock/AddIdentity, outputTemplate=esignet/AddIdentityMock/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with valid parameters VCI Vid, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AddIdentity_Valid_Params_VCI_uin_Inv_Scen_smoke_Pos, endPoint=/v1/mock-identity-system/identity, role=idrepo, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "individualId": "$RANDOMINDIVIDUALIDFORMOCKIDENTITY$", "pin": "545411", "email": "$EMAILIDFORMOCKIDENTITY$", "password": "$PASSWORDFORMOCKIDENTITY$", "phone": "$PHONEFORMOCKIDENTITY$" }, output={ "status":"mock identity data created successfully" }, inputTemplate=esignet/AddIdentityMock/AddIdentity, outputTemplate=esignet/AddIdentityMock/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with valid parameters VCI UIN invalid scenario, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AddIdentity_Valid_Params_VCI_uin_smoke_Pos, endPoint=/v1/mock-identity-system/identity, role=idrepo, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "individualId": "$RANDOMINDIVIDUALIDFORMOCKIDENTITY$", "pin": "545411", "email": "$EMAILIDFORMOCKIDENTITY$", "password": "$PASSWORDFORMOCKIDENTITY$", "phone": "$PHONEFORMOCKIDENTITY$" }, output={ "status":"mock identity data created successfully" }, inputTemplate=esignet/AddIdentityMock/AddIdentity, outputTemplate=esignet/AddIdentityMock/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with valid parameters VCI UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AddIdentity_Valid_Params_WOEmail_smoke_Pos, endPoint=/v1/mock-identity-system/identity, role=idrepo, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "individualId": "$RANDOMINDIVIDUALIDFORMOCKIDENTITY$", "pin": "545411", "email": "$EMAILIDFORMOCKIDENTITY$", "password": "$PASSWORDFORMOCKIDENTITY$", "phone": "$PHONEFORMOCKIDENTITY$" }, output={ "status":"mock identity data created successfully" }, inputTemplate=esignet/AddIdentityMock/AddIdentity, outputTemplate=esignet/AddIdentityMock/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with valid parameter and without Email, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AddIdentity_Valid_Params_WOPhone_smoke_Pos, endPoint=/v1/mock-identity-system/identity, role=idrepo, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "individualId": "$RANDOMINDIVIDUALIDFORMOCKIDENTITY$", "pin": "545411", "email": "$EMAILIDFORMOCKIDENTITY$", "password": "$PASSWORDFORMOCKIDENTITY$", "phone": "$PHONEFORMOCKIDENTITY$" }, output={ "status":"mock identity data created successfully" }, inputTemplate=esignet/AddIdentityMock/AddIdentity, outputTemplate=esignet/AddIdentityMock/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with valid parameter and without phone number, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AddIdentity_Vid_2_Generation_smoke_Pos, endPoint=/v1/mock-identity-system/identity, role=idrepo, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "individualId": "$RANDOMINDIVIDUALIDFORMOCKIDENTITY$", "pin": "545411", "email": "$EMAILIDFORMOCKIDENTITY$", "password": "$PASSWORDFORMOCKIDENTITY$", "phone": "$PHONEFORMOCKIDENTITY$" }, output={ "status":"mock identity data created successfully" }, inputTemplate=esignet/AddIdentityMock/AddIdentity, outputTemplate=esignet/AddIdentityMock/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity Vid generation, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AddIdentity_Vid_Generation_smoke_Pos, endPoint=/v1/mock-identity-system/identity, role=idrepo, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "individualId": "$RANDOMINDIVIDUALIDFORMOCKIDENTITY$", "pin": "545411", "email": "$EMAILIDFORMOCKIDENTITY$", "password": "$PASSWORDFORMOCKIDENTITY$", "phone": "$PHONEFORMOCKIDENTITY$" }, output={ "status":"mock identity data created successfully" }, inputTemplate=esignet/AddIdentityMock/AddIdentity, outputTemplate=esignet/AddIdentityMock/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity Vid generation, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AddIdentity_BioAuth_smoke_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "ESignet_AddIdentity_BioAuth_smoke_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate=esignet/AddIdentity/addIdentity_$LANGNUMBER$, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with BioAuth, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.AddIdentity.test(AddIdentity.java:90)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AddIdentity_Consent_Vid_smoke_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "ESignet_AddIdentity_Consent_Vid_smoke_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate=esignet/AddIdentity/addIdentity_$LANGNUMBER$, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity consent Vid, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.AddIdentity.test(AddIdentity.java:90)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AddIdentity_Consent_smoke_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "ESignet_AddIdentity_Consent_smoke_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate=esignet/AddIdentity/addIdentity_$LANGNUMBER$, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity consent, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.AddIdentity.test(AddIdentity.java:90)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AddIdentity_Invalid_Scen_smoke_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "ESignet_AddIdentity_Invalid_Scen_smoke_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate=esignet/AddIdentity/addIdentity_$LANGNUMBER$, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with invalid scenario, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.AddIdentity.test(AddIdentity.java:90)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AddIdentity_KycAuth_smoke_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "ESignet_AddIdentity_KycAuth_smoke_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate=esignet/AddIdentity/addIdentity_$LANGNUMBER$, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with KycAuth, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.AddIdentity.test(AddIdentity.java:90)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AddIdentity_L2_Valid_Parameters_smoke_Neg_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "ESignet_AddIdentity_L2_Valid_Parameters_smoke_Neg_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate=esignet/AddIdentity/addIdentity_$LANGNUMBER$, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=null, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.AddIdentity.test(AddIdentity.java:90)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AddIdentity_L2_Valid_Parameters_smoke_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "ESignet_AddIdentity_L2_Valid_Parameters_smoke_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate=esignet/AddIdentity/addIdentity_$LANGNUMBER$, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=null, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.AddIdentity.test(AddIdentity.java:90)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AddIdentity_Linked_Consent_User2_Vid_smoke_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "ESignet_AddIdentity_Linked_Consent_User2_Vid_smoke_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate=esignet/AddIdentity/addIdentity_$LANGNUMBER$, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity linked consent user2 Vid, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.AddIdentity.test(AddIdentity.java:90)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AddIdentity_Linked_Consent_User2_smoke_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "ESignet_AddIdentity_Linked_Consent_User2_smoke_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate=esignet/AddIdentity/addIdentity_$LANGNUMBER$, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity linked consent user2, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.AddIdentity.test(AddIdentity.java:90)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AddIdentity_Linked_Consent_Vid_smoke_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "ESignet_AddIdentity_Linked_Consent_Vid_smoke_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate=esignet/AddIdentity/addIdentity_$LANGNUMBER$, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity linked consent Vid, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.AddIdentity.test(AddIdentity.java:90)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AddIdentity_Linked_Consent_smoke_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "ESignet_AddIdentity_Linked_Consent_smoke_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate=esignet/AddIdentity/addIdentity_$LANGNUMBER$, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity linked consent, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.AddIdentity.test(AddIdentity.java:90)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AddIdentity_Linked_Sce_smoke_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "ESignet_AddIdentity_Linked_Sce_smoke_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate=esignet/AddIdentity/addIdentity_$LANGNUMBER$, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with valid parameters, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.AddIdentity.test(AddIdentity.java:90)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AddIdentity_Password_Auth_smoke_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "ESignet_AddIdentity_Password_Auth_smoke_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate=esignet/AddIdentity/addIdentity_$LANGNUMBER$, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with password authentication, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.AddIdentity.test(AddIdentity.java:90)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AddIdentity_Valid_Parameters_Sce2_smoke_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "ESignet_AddIdentity_Valid_Parameters_Sce2_smoke_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate=esignet/AddIdentity/addIdentity_$LANGNUMBER$, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with all valid parameters, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.AddIdentity.test(AddIdentity.java:90)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AddIdentity_Valid_Parameters_smoke_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "ESignet_AddIdentity_Valid_Parameters_smoke_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate=esignet/AddIdentity/addIdentity_$LANGNUMBER$, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with all valid parameters, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.AddIdentity.test(AddIdentity.java:90)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AddIdentity_Valid_Params_BindOtp_smoke_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "ESignet_AddIdentity_Valid_Params_BindOtp_smoke_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate=esignet/AddIdentity/addIdentity_$LANGNUMBER$, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with all valid parameters, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.AddIdentity.test(AddIdentity.java:90)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AddIdentity_Valid_Params_VCI_Vid_Inv_Scen_smoke_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "ESignet_AddIdentity_Valid_Params_VCI_Vid_Inv_Scen_smoke_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate=esignet/AddIdentity/addIdentity_$LANGNUMBER$, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with valid parameters VCI Vid invalid scenario, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.AddIdentity.test(AddIdentity.java:90)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AddIdentity_Valid_Params_VCI_Vid_smoke_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "ESignet_AddIdentity_Valid_Params_VCI_Vid_smoke_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate=esignet/AddIdentity/addIdentity_$LANGNUMBER$, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with valid parameters VCI Vid, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.AddIdentity.test(AddIdentity.java:90)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AddIdentity_Valid_Params_VCI_uin_Inv_Scen_smoke_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "ESignet_AddIdentity_Valid_Params_VCI_uin_smoke_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate=esignet/AddIdentity/addIdentity_$LANGNUMBER$, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with valid parameters VCI UIN invalid scenario, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.AddIdentity.test(AddIdentity.java:90)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AddIdentity_Valid_Params_VCI_uin_smoke_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "ESignet_AddIdentity_Valid_Params_VCI_uin_smoke_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate=esignet/AddIdentity/addIdentity_$LANGNUMBER$, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with valid parameters VCI UIN, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.AddIdentity.test(AddIdentity.java:90)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AddIdentity_Valid_Params_WOEmail_smoke_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "phone": "9876543210", "email": "$REMOVE$", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate=esignet/AddIdentity/addIdentity_$LANGNUMBER$, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with valid parameter and without Email, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.AddIdentity.test(AddIdentity.java:90)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AddIdentity_Valid_Params_WOPhone_smoke_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "phone": "$REMOVE$", "email": "ESignet_AddIdentity_Valid_Params_WOPhone_smoke_Pos@mosip.net", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate=esignet/AddIdentity/addIdentity_$LANGNUMBER$, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with valid parameter and without phone number, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.AddIdentity.test(AddIdentity.java:90)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AddIdentity_Vid_2_Generation_smoke_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "ESignet_AddIdentity_Vid_2_Generation_smoke_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate=esignet/AddIdentity/addIdentity_$LANGNUMBER$, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity Vid generation, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.AddIdentity.test(AddIdentity.java:90)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AddIdentity_Vid_Generation_smoke_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "ESignet_AddIdentity_Vid_Generation_smoke_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate=esignet/AddIdentity/addIdentity_$LANGNUMBER$, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity Vid generation, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.AddIdentity.test(AddIdentity.java:90)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_DefinePolicyGroup_All_Valid_Smoke_sid, endPoint=/v1/policymanager/policies/group/new, role=partner, templateFields=null, input={ "desc": "$POLICYGROUPDESC$", "name": "$POLICYGROUPNAME$", "requesttime": "$TIMESTAMP$" }, output= { "id": "$IGNORE$", "name": "$IGNORE$", "desc": "$IGNORE$", "is_Active": true }, inputTemplate=esignet/PmsIntegration/DefinePolicyGroup/definePolicyGroup, outputTemplate=esignet/PmsIntegration/DefinePolicyGroup/definePolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define policy group with all valid parameters, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:91)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_DefinePolicyGroup_Misp_Valid_Smoke_sid, endPoint=/v1/policymanager/policies/group/new, role=partner, templateFields=null, input={ "desc": "$MISPPOLICYGROUPDESC$", "name": "$MISPPOLICYGROUPNAME$", "requesttime": "$TIMESTAMP$" }, output= { "id": "$IGNORE$", "name": "$IGNORE$", "desc": "$IGNORE$", "is_Active": true }, inputTemplate=esignet/PmsIntegration/DefinePolicyGroup/definePolicyGroup, outputTemplate=esignet/PmsIntegration/DefinePolicyGroup/definePolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define policy group with valid Misp, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:91)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_DefinePolicyGroup_Valid_Smoke_sid, endPoint=/v1/policymanager/policies/group/new, role=partner, templateFields=null, input={ "desc": "$RIDDEL$", "name": "$RIDDEL$", "requesttime": "$TIMESTAMP$" }, output= { "id": "$IGNORE$", "name": "$IGNORE$", "desc": "$IGNORE$", "is_Active": true }, inputTemplate=esignet/PmsIntegration/DefinePolicyGroup/definePolicyGroup, outputTemplate=esignet/PmsIntegration/DefinePolicyGroup/definePolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define policy group with valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:91)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_DefinePolicyGroup_in_Valid_Smoke_sid, endPoint=/v1/policymanager/policies/group/new, role=partner, templateFields=null, input={ "desc": "$RID$", "name": "$RID$", "requesttime": "$TIMESTAMP$" }, output= { "id": "$IGNORE$", "name": "$IGNORE$", "desc": "$IGNORE$", "is_Active": true }, inputTemplate=esignet/PmsIntegration/DefinePolicyGroup/definePolicyGroup, outputTemplate=esignet/PmsIntegration/DefinePolicyGroup/definePolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define policy group with valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:91)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_DefinePolicy_All_Valid_Smoke_sid, endPoint=/v1/policymanager/policies, role=partner, templateFields=null, input={ "desc": "$POLICYDESC$", "name": "$POLICYNAME$", "policyGroupName": "$ID:DefinePolicyGroup_All_Valid_Smoke_sid_name$", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "$IGNORE$", "name": "$IGNORE$", "desc": "$IGNORE$", "is_Active": false }, inputTemplate=esignet/PmsIntegration/DefinePolicy/definePolicy, outputTemplate=esignet/PmsIntegration/DefinePolicy/definePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define policy with all valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:91)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_DefinePolicy_Auth_False_Valid_Smoke_sid, endPoint=/v1/policymanager/policies, role=partner, templateFields=null, input={ "desc": "$POLICYDESC1$", "name": "$RANDOMPOLICYNAME$", "policyGroupName": "$ID:DefinePolicyGroup_Misp_Valid_Smoke_sid_name$", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "$IGNORE$", "name": "$IGNORE$", "desc": "$IGNORE$", "is_Active": false }, inputTemplate=esignet/PmsIntegration/DefinePolicy/definePolicyWOPhone, outputTemplate=esignet/PmsIntegration/DefinePolicy/definePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define policy with Auth and isActive as false, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:91)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_DefinePolicy_Auth_S2_Valid_Smoke_sid, endPoint=/v1/policymanager/policies, role=partner, templateFields=null, input={ "desc": "$POLICYDESC1$", "name": "$RANDOMPOLICYNAME$", "policyGroupName": "$ID:DefinePolicyGroup_Misp_Valid_Smoke_sid_name$", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "$IGNORE$", "name": "$IGNORE$", "desc": "$IGNORE$", "is_Active": false }, inputTemplate=esignet/PmsIntegration/DefinePolicy/definePolicy, outputTemplate=esignet/PmsIntegration/DefinePolicy/definePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define policy with Auth S2, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:91)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_DefinePolicy_Auth_Valid_Smoke_sid, endPoint=/v1/policymanager/policies, role=partner, templateFields=null, input={ "desc": "$POLICYDESC1$", "name": "$POLICYNAME1$", "policyGroupName": "$ID:DefinePolicyGroup_Misp_Valid_Smoke_sid_name$", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "$IGNORE$", "name": "$IGNORE$", "desc": "$IGNORE$", "is_Active": false }, inputTemplate=esignet/PmsIntegration/DefinePolicy/definePolicy, outputTemplate=esignet/PmsIntegration/DefinePolicy/definePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define policy with Auth, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:91)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_DefinePolicy_Invalid_MispPolicy_Neg, endPoint=/v1/policymanager/policies, role=partner, templateFields=null, input={ "desc": "$MISPPOLICYDESC$", "name": "$RANDOMPOLICYNAME$", "policyGroupName": "$ID:DefinePolicyGroup_Misp_Valid_Smoke_sid_name$", "policyType": "MISP", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "$IGNORE$", "name": "$IGNORE$", "desc": "$IGNORE$", "is_Active": false }, inputTemplate=esignet/PmsIntegration/DefinePolicy/definePolicyInvalid2, outputTemplate=esignet/PmsIntegration/DefinePolicy/definePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define policy with invalid MispPolicy, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:91)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_DefinePolicy_Invalid_PolicyAuth_Neg, endPoint=/v1/policymanager/policies, role=partner, templateFields=null, input={ "desc": "$MISPPOLICYDESC$", "name": "$RANDOMPOLICYNAME$", "policyGroupName": "$ID:DefinePolicyGroup_Misp_Valid_Smoke_sid_name$", "policyType": "MISP", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "$IGNORE$", "name": "$IGNORE$", "desc": "$IGNORE$", "is_Active": false }, inputTemplate=esignet/PmsIntegration/DefinePolicy/definePolicyInvalid, outputTemplate=esignet/PmsIntegration/DefinePolicy/definePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define policy with invalid policyAuth, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:91)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_DefinePolicy_Invalid_PolicyGroupName_Neg, endPoint=/v1/policymanager/policies, role=partner, templateFields=null, input={ "desc": "$MISPPOLICYDESC$", "name": "$MISPPOLICYNAME$", "policyGroupName": "sdnvfsjf", "policyType": "MISP", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_POL_019", "message": "$IGNORE$" } ] }, inputTemplate=esignet/PmsIntegration/DefinePolicy/definePolicyMisp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define policy with invalid policyGroupName, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:91)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_DefinePolicy_Invalid_PolicyType_Neg, endPoint=/v1/policymanager/policies, role=partner, templateFields=null, input={ "desc": "$MISPPOLICYDESC$", "name": "$MISPPOLICYNAME$", "policyGroupName": "$ID:DefinePolicyGroup_Misp_Valid_Smoke_sid_name$", "policyType": "shdb", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_POL_023", "message": "$IGNORE$" } ] }, inputTemplate=esignet/PmsIntegration/DefinePolicy/definePolicyMisp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define policy with invalid policyType, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:91)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_DefinePolicy_Misp_False_Valid_Smoke_sid, endPoint=/v1/policymanager/policies, role=partner, templateFields=null, input={ "desc": "$MISPPOLICYDESC$", "name": "$RANDOMPOLICYNAME$", "policyGroupName": "$ID:DefinePolicyGroup_Misp_Valid_Smoke_sid_name$", "policyType": "MISP", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "$IGNORE$", "name": "$IGNORE$", "desc": "$IGNORE$", "is_Active": false }, inputTemplate=esignet/PmsIntegration/DefinePolicy/definePolicyMispFalse, outputTemplate=esignet/PmsIntegration/DefinePolicy/definePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define policy with isActive as false, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:91)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_DefinePolicy_Misp_S2_Valid_Smoke_sid, endPoint=/v1/policymanager/policies, role=partner, templateFields=null, input={ "desc": "$MISPPOLICYDESC$", "name": "$RANDOMPOLICYNAME$", "policyGroupName": "$ID:DefinePolicyGroup_Misp_Valid_Smoke_sid_name$", "policyType": "MISP", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "$IGNORE$", "name": "$IGNORE$", "desc": "$IGNORE$", "is_Active": false }, inputTemplate=esignet/PmsIntegration/DefinePolicy/definePolicyMisp, outputTemplate=esignet/PmsIntegration/DefinePolicy/definePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define policy with Misp S2, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:91)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_DefinePolicy_Misp_Valid_Smoke_sid, endPoint=/v1/policymanager/policies, role=partner, templateFields=null, input={ "desc": "$MISPPOLICYDESC$", "name": "$MISPPOLICYNAME$", "policyGroupName": "$ID:DefinePolicyGroup_Misp_Valid_Smoke_sid_name$", "policyType": "MISP", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "$IGNORE$", "name": "$IGNORE$", "desc": "$IGNORE$", "is_Active": false }, inputTemplate=esignet/PmsIntegration/DefinePolicy/definePolicyMisp, outputTemplate=esignet/PmsIntegration/DefinePolicy/definePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define policy with all valid details Misp, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:91)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_DefinePolicy_NonAuth_All_Valid_Smoke_sid, endPoint=/v1/policymanager/policies, role=partner, templateFields=null, input={ "desc": "$POLICYDESC$", "name": "$POLICYNAMENONAUTH$", "policyGroupName": "$ID:DefinePolicyGroup_All_Valid_Smoke_sid_name$", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "$IGNORE$", "name": "$IGNORE$", "desc": "$IGNORE$", "is_Active": false }, inputTemplate=esignet/PmsIntegration/DefinePolicy/definePolicyNonAuth, outputTemplate=esignet/PmsIntegration/DefinePolicy/definePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define policy with NonAuth, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:91)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_DefinePolicy_With_1_Policy_All_Valid_Smoke_sid, endPoint=/v1/policymanager/policies, role=partner, templateFields=null, input={ "desc": "$POLICYDESC$", "name": "$RANDOMPOLICYNAME$", "policyGroupName": "$ID:DefinePolicyGroup_Misp_Valid_Smoke_sid_name$", "policyType": "MISP", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_PV_006", "message": "$IGNORE$" } ] }, inputTemplate=esignet/PmsIntegration/DefinePolicy/definePolicyMisp1, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define policy with 1 policy valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:91)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_DefinePolicy_With_2_Policy_All_Valid_Smoke_sid, endPoint=/v1/policymanager/policies, role=partner, templateFields=null, input={ "desc": "$POLICYDESC$", "name": "$RANDOMPOLICYNAME$", "policyGroupName": "$ID:DefinePolicyGroup_Misp_Valid_Smoke_sid_name$", "policyType": "MISP", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_PV_006", "message": "$IGNORE$" } ] }, inputTemplate=esignet/PmsIntegration/DefinePolicy/definePolicyMisp2, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define policy with 2 policy valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:91)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_DefinePolicy__Invalid_Misp_Name_Neg, endPoint=/v1/policymanager/policies, role=partner, templateFields=null, input={ "desc": "$MISPPOLICYDESC$", "name": "$MISPPOLICYNAME$", "policyGroupName": "$ID:DefinePolicyGroup_Misp_Valid_Smoke_sid_name$", "policyType": "MISP", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_POL_009", "message": "$IGNORE$" } ] }, inputTemplate=esignet/PmsIntegration/DefinePolicy/definePolicyMisp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define policy with invalid Misp Name, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:91)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_PublishPolicy_All_Valid_Smoke, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}/publish, role=partner, templateFields=null, input={ "policygroupId": "$ID:DefinePolicyGroup_All_Valid_Smoke_sid_id$", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_sid_id$", "requesttime": "$TIMESTAMP$" }, output={ "policyGroupName": "$IGNORE$", "policyGroupDesc": "$IGNORE$", "policyGroupStatus": "true", "policyName": "$IGNORE$", "policyDesc": "$IGNORE$", "policyType": "Auth", "status": "PUBLISHED", "is_Active": "true", "authType": "bio", "authSubType": "$IGNORE$", "mandatory": "$IGNORE$", "attributeName": "$IGNORE$", "authTokenType": "$IGNORE$" }, inputTemplate=esignet/PmsIntegration/PublishPolicy/publishPolicy, outputTemplate=esignet/PmsIntegration/PublishPolicy/publishPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Publish policy with all valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.PostWithOnlyPathParam.test(PostWithOnlyPathParam.java:85)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_PublishPolicy_Auth_False_Valid_Smoke, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}/publish, role=partner, templateFields=null, input={ "policygroupId": "$ID:DefinePolicyGroup_Misp_Valid_Smoke_sid_id$", "policyId": "$ID:DefinePolicy_Auth_False_Valid_Smoke_sid_id$", "requesttime": "$TIMESTAMP$" }, output={ "policyGroupName": "$IGNORE$", "policyGroupDesc": "$IGNORE$", "policyGroupStatus": "true", "policyName": "$IGNORE$", "policyDesc": "$IGNORE$", "policyType": "Auth", "status": "PUBLISHED", "is_Active": "true", "authType": "bio", "authSubType": "$IGNORE$", "mandatory": "$IGNORE$", "attributeName": "$IGNORE$", "authTokenType": "$IGNORE$" }, inputTemplate=esignet/PmsIntegration/PublishPolicy/publishPolicy, outputTemplate=esignet/PmsIntegration/PublishPolicy/publishPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Publish policy Auth false valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.PostWithOnlyPathParam.test(PostWithOnlyPathParam.java:85)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_PublishPolicy_Auth_S2_Valid_Smoke, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}/publish, role=partner, templateFields=null, input={ "policygroupId": "$ID:DefinePolicyGroup_Misp_Valid_Smoke_sid_id$", "policyId": "$ID:DefinePolicy_Auth_S2_Valid_Smoke_sid_id$", "requesttime": "$TIMESTAMP$" }, output={ "policyGroupName": "$IGNORE$", "policyGroupDesc": "$IGNORE$", "policyGroupStatus": "true", "policyName": "$IGNORE$", "policyDesc": "$IGNORE$", "policyType": "Auth", "status": "PUBLISHED", "is_Active": "true", "authType": "bio", "authSubType": "$IGNORE$", "mandatory": "$IGNORE$", "attributeName": "$IGNORE$", "authTokenType": "$IGNORE$" }, inputTemplate=esignet/PmsIntegration/PublishPolicy/publishPolicy, outputTemplate=esignet/PmsIntegration/PublishPolicy/publishPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Publish policy Auth S2 valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.PostWithOnlyPathParam.test(PostWithOnlyPathParam.java:85)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_PublishPolicy_Misp_False_Valid_Smoke, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}/publish, role=partner, templateFields=null, input={ "policygroupId": "$ID:DefinePolicyGroup_Misp_Valid_Smoke_sid_id$", "policyId": "$ID:DefinePolicy_Misp_False_Valid_Smoke_sid_id$", "requesttime": "$TIMESTAMP$" }, output={ "policyGroupName": "$IGNORE$", "policyGroupDesc": "$IGNORE$", "policyGroupStatus": "true", "policyName": "$IGNORE$", "policyDesc": "$IGNORE$", "policyType": "MISP", "status": "PUBLISHED", "is_Active": "true", "authType": "$IGNORE$", "authSubType": "$IGNORE$", "mandatory": "$IGNORE$", "attributeName": "$IGNORE$", "authTokenType": "$IGNORE$" }, inputTemplate=esignet/PmsIntegration/PublishPolicy/publishPolicy, outputTemplate=esignet/PmsIntegration/PublishPolicy/publishPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Publish policy Misp false valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.PostWithOnlyPathParam.test(PostWithOnlyPathParam.java:85)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_PublishPolicy_Misp_S2_Valid_Smoke, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}/publish, role=partner, templateFields=null, input={ "policygroupId": "$ID:DefinePolicyGroup_Misp_Valid_Smoke_sid_id$", "policyId": "$ID:DefinePolicy_Misp_S2_Valid_Smoke_sid_id$", "requesttime": "$TIMESTAMP$" }, output={ "policyGroupName": "$IGNORE$", "policyGroupDesc": "$IGNORE$", "policyGroupStatus": "true", "policyName": "$IGNORE$", "policyDesc": "$IGNORE$", "policyType": "MISP", "status": "PUBLISHED", "is_Active": "true", "authType": "$IGNORE$", "authSubType": "$IGNORE$", "mandatory": "$IGNORE$", "attributeName": "$IGNORE$", "authTokenType": "$IGNORE$" }, inputTemplate=esignet/PmsIntegration/PublishPolicy/publishPolicy, outputTemplate=esignet/PmsIntegration/PublishPolicy/publishPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Publish policy Misp S2 valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.PostWithOnlyPathParam.test(PostWithOnlyPathParam.java:85)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_PublishPolicy_Misp_Valid_Smoke, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}/publish, role=partner, templateFields=null, input={ "policygroupId": "$ID:DefinePolicyGroup_Misp_Valid_Smoke_sid_id$", "policyId": "$ID:DefinePolicy_Misp_Valid_Smoke_sid_id$", "requesttime": "$TIMESTAMP$" }, output={ "policyGroupName": "$IGNORE$", "policyGroupDesc": "$IGNORE$", "policyGroupStatus": "true", "policyName": "$IGNORE$", "policyDesc": "$IGNORE$", "policyType": "MISP", "status": "PUBLISHED", "is_Active": "true", "authType": "$IGNORE$", "authSubType": "$IGNORE$", "mandatory": "$IGNORE$", "attributeName": "$IGNORE$", "authTokenType": "$IGNORE$" }, inputTemplate=esignet/PmsIntegration/PublishPolicy/publishPolicy, outputTemplate=esignet/PmsIntegration/PublishPolicy/publishPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Publish policy Misp with all valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.PostWithOnlyPathParam.test(PostWithOnlyPathParam.java:85)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_PublishPolicy_NonAuth_All_Valid_Smoke, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}/publish, role=partner, templateFields=null, input={ "policygroupId": "$ID:DefinePolicyGroup_All_Valid_Smoke_sid_id$", "policyId": "$ID:DefinePolicy_NonAuth_All_Valid_Smoke_sid_id$", "requesttime": "$TIMESTAMP$" }, output={ "policyGroupName": "$IGNORE$", "policyGroupDesc": "$IGNORE$", "policyGroupStatus": "true", "policyName": "$IGNORE$", "policyDesc": "$IGNORE$", "policyType": "Auth", "status": "PUBLISHED", "is_Active": "true", "authType": "$IGNORE$", "authSubType": "$IGNORE$", "mandatory": "$IGNORE$", "attributeName": "$IGNORE$", "authTokenType": "$IGNORE$" }, inputTemplate=esignet/PmsIntegration/PublishPolicy/publishPolicy, outputTemplate=esignet/PmsIntegration/PublishPolicy/publishPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Publish policy with NonAuth valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.PostWithOnlyPathParam.test(PostWithOnlyPathParam.java:85)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_PublishPolicy_Valid_Smoke, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}/publish, role=partner, templateFields=null, input={ "policygroupId": "$ID:DefinePolicyGroup_Misp_Valid_Smoke_sid_id$", "policyId": "$ID:DefinePolicy_Auth_Valid_Smoke_sid_id$", "requesttime": "$TIMESTAMP$" }, output={ "policyGroupName": "$IGNORE$", "policyGroupDesc": "$IGNORE$", "policyGroupStatus": "true", "policyName": "$IGNORE$", "policyDesc": "$IGNORE$", "policyType": "Auth", "status": "PUBLISHED", "is_Active": "true", "authType": "bio", "authSubType": "$IGNORE$", "mandatory": "$IGNORE$", "attributeName": "$IGNORE$", "authTokenType": "$IGNORE$" }, inputTemplate=esignet/PmsIntegration/PublishPolicy/publishPolicy, outputTemplate=esignet/PmsIntegration/PublishPolicy/publishPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Publish policy with valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.PostWithOnlyPathParam.test(PostWithOnlyPathParam.java:85)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_PartnerSelfRegistration_All_Valid_Smoke_sid, endPoint=/v1/partnermanager/partners, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "8553967372", "emailId": "$PARTNEREMAIL$", "organizationName": "$PARTNERID$", "partnerId": "$PARTNERID$", "partnerType": "Auth_Partner", "policyGroup": "$ID:DefinePolicyGroup_All_Valid_Smoke_sid_name$", "requesttime": "$TIMESTAMP$" }, output= { "partnerId": "$IGNORE$", "status": "InProgress" }, inputTemplate=esignet/PmsIntegration/CreatePartner/createPartner, outputTemplate=esignet/PmsIntegration/CreatePartner/createPartnerResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=PartnerSelfRegistration with all valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:91)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_PartnerSelfRegistration_Auth_False_Valid_Smoke_sid, endPoint=/v1/partnermanager/partners, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "8553967372", "emailId": "$RANDOMPARTNEREMAIL$", "organizationName": "$RANDOMPARTNERID$", "partnerId": "$RANDOMPARTNERID$", "partnerType": "Auth_Partner", "policyGroup": "$ID:DefinePolicyGroup_Misp_Valid_Smoke_sid_name$", "requesttime": "$TIMESTAMP$" }, output= { "partnerId": "$IGNORE$", "status": "InProgress" }, inputTemplate=esignet/PmsIntegration/CreatePartner/createPartner, outputTemplate=esignet/PmsIntegration/CreatePartner/createPartnerResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=PartnerSelfRegistration Auth false valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:91)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_PartnerSelfRegistration_Auth_S2_Valid_Smoke_sid, endPoint=/v1/partnermanager/partners, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "8553967372", "emailId": "$RANDOMPARTNEREMAIL$", "organizationName": "$RANDOMPARTNERID$", "partnerId": "$RANDOMPARTNERID$", "partnerType": "Auth_Partner", "policyGroup": "$ID:DefinePolicyGroup_Misp_Valid_Smoke_sid_name$", "requesttime": "$TIMESTAMP$" }, output= { "partnerId": "$IGNORE$", "status": "InProgress" }, inputTemplate=esignet/PmsIntegration/CreatePartner/createPartner, outputTemplate=esignet/PmsIntegration/CreatePartner/createPartnerResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=PartnerSelfRegistration Auth S2 valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:91)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_PartnerSelfRegistration_Kyc_Valid_Smoke_sid, endPoint=/v1/partnermanager/partners, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "8553967372", "emailId": "$PARTNEREMAIL1$", "organizationName": "$PARTNERID1$", "partnerId": "$PARTNERID1$", "partnerType": "Auth_Partner", "policyGroup": "$ID:DefinePolicyGroup_Misp_Valid_Smoke_sid_name$", "requesttime": "$TIMESTAMP$" }, output= { "partnerId": "$IGNORE$", "status": "InProgress" }, inputTemplate=esignet/PmsIntegration/CreatePartner/createPartner, outputTemplate=esignet/PmsIntegration/CreatePartner/createPartnerResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=PartnerSelfRegistration Kyc valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:91)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_PartnerSelfRegistration_Misp_False_Valid_Smoke_sid, endPoint=/v1/partnermanager/partners, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "8553967372", "emailId": "$RANDOMPARTNEREMAIL$", "organizationName": "$RANDOMPARTNERID$", "partnerId": "$RANDOMPARTNERID$", "partnerType": "MISP_Partner", "policyGroup": "$ID:DefinePolicyGroup_Misp_Valid_Smoke_sid_name$", "requesttime": "$TIMESTAMP$" }, output= { "partnerId": "$IGNORE$", "status": "InProgress" }, inputTemplate=esignet/PmsIntegration/CreatePartner/createPartner, outputTemplate=esignet/PmsIntegration/CreatePartner/createPartnerResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=PartnerSelfRegistration Misp false valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:91)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_PartnerSelfRegistration_Misp_S2_Valid_Smoke_sid, endPoint=/v1/partnermanager/partners, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "8553967372", "emailId": "$RANDOMPARTNEREMAIL$", "organizationName": "$RANDOMPARTNERID$", "partnerId": "$RANDOMPARTNERID$", "partnerType": "MISP_Partner", "policyGroup": "$ID:DefinePolicyGroup_Misp_Valid_Smoke_sid_name$", "requesttime": "$TIMESTAMP$" }, output= { "partnerId": "$IGNORE$", "status": "InProgress" }, inputTemplate=esignet/PmsIntegration/CreatePartner/createPartner, outputTemplate=esignet/PmsIntegration/CreatePartner/createPartnerResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=PartnerSelfRegistration Misp S2 valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:91)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_PartnerSelfRegistration_Misp_Valid_Smoke_sid, endPoint=/v1/partnermanager/partners, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "8553967372", "emailId": "$MISPPARTNEREMAIL$", "organizationName": "$MISPPARTNERID$", "partnerId": "$MISPPARTNERID$", "partnerType": "MISP_Partner", "policyGroup": "$ID:DefinePolicyGroup_Misp_Valid_Smoke_sid_name$", "requesttime": "$TIMESTAMP$" }, output= { "partnerId": "$IGNORE$", "status": "InProgress" }, inputTemplate=esignet/PmsIntegration/CreatePartner/createPartner, outputTemplate=esignet/PmsIntegration/CreatePartner/createPartnerResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=PartnerSelfRegistration Misp valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:91)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_PartnerSelfRegistration_NonAuth_All_Valid_Smoke_sid, endPoint=/v1/partnermanager/partners, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "8553967372", "emailId": "$PARTNEREMAILNONAUTH$", "organizationName": "$PARTNERIDNONAUTH$", "partnerId": "$PARTNERIDNONAUTH$", "partnerType": "Auth_Partner", "policyGroup": "$ID:DefinePolicyGroup_All_Valid_Smoke_sid_name$", "requesttime": "$TIMESTAMP$" }, output= { "partnerId": "$IGNORE$", "status": "InProgress" }, inputTemplate=esignet/PmsIntegration/CreatePartner/createPartner, outputTemplate=esignet/PmsIntegration/CreatePartner/createPartnerResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=PartnerSelfRegistration NonAuth all valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:91)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_UploadCACertificate_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partner, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "certificateData": "$CACERT$", "requesttime": "$TIMESTAMP$" }, output= { "status": "Upload Success." }, inputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificate, outputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=upload CACertificate with all valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:86)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_UploadCACertificate_Auth_False_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partner, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_Auth_False_Valid_Smoke_sid_partnerId$", "certificateData": "$MISPCACERT$", "requesttime": "$TIMESTAMP$" }, output= { "status": "Upload Success." }, inputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificate, outputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=upload CACertificate Auth false valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:86)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_UploadCACertificate_Auth_S2_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partner, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_Auth_S2_Valid_Smoke_sid_partnerId$", "certificateData": "$MISPCACERT$", "requesttime": "$TIMESTAMP$" }, output= { "status": "Upload Success." }, inputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificate, outputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=upload CACertificate Auth S2 valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:86)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_UploadCACertificate_Kyc_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partner, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_Kyc_Valid_Smoke_sid_partnerId$", "certificateData": "$CACERT$", "requesttime": "$TIMESTAMP$" }, output= { "status": "Upload Success." }, inputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificate, outputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=upload CACertificate Kyc with all valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:86)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_UploadCACertificate_Misp_False_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partner, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_Misp_False_Valid_Smoke_sid_partnerId$", "certificateData": "$MISPCACERT$", "requesttime": "$TIMESTAMP$" }, output= { "status": "Upload Success." }, inputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificate, outputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=upload CACertificate Misp False valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:86)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_UploadCACertificate_Misp_S2_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partner, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_Misp_S2_Valid_Smoke_sid_partnerId$", "certificateData": "$MISPCACERT$", "requesttime": "$TIMESTAMP$" }, output= { "status": "Upload Success." }, inputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificate, outputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=upload CACertificate Misp S2 valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:86)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_UploadCACertificate_Misp_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partner, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_Misp_Valid_Smoke_sid_partnerId$", "certificateData": "$MISPCACERT$", "requesttime": "$TIMESTAMP$" }, output= { "status": "Upload Success." }, inputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificate, outputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=upload CACertificate Misp valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:86)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_UploadCACertificate_NonAuth_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partner, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_NonAuth_All_Valid_Smoke_sid_partnerId$", "certificateData": "$CACERT$", "requesttime": "$TIMESTAMP$" }, output= { "status": "Upload Success." }, inputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificate, outputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=upload CACertificate NonAuth with all valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:86)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_UploadCInterCertificate_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partner, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "certificateData": "$INTERCERT$", "requesttime": "$TIMESTAMP$" }, output= { "status": "Upload Success." }, inputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificate, outputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=upload CACertificate with all valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:86)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_UploadCInterCertificate_Auth_False_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partner, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_Auth_False_Valid_Smoke_sid_partnerId$", "certificateData": "$MISPINTERCERT$", "requesttime": "$TIMESTAMP$" }, output= { "status": "Upload Success." }, inputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificate, outputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=upload CACertificate Auth false valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:86)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_UploadCInterCertificate_Auth_S2_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partner, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_Auth_S2_Valid_Smoke_sid_partnerId$", "certificateData": "$MISPINTERCERT$", "requesttime": "$TIMESTAMP$" }, output= { "status": "Upload Success." }, inputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificate, outputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=upload CACertificate Auth S2 valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:86)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_UploadCInterCertificate_Kyc_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partner, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_Kyc_Valid_Smoke_sid_partnerId$", "certificateData": "$INTERCERT$", "requesttime": "$TIMESTAMP$" }, output= { "status": "Upload Success." }, inputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificate, outputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=upload CACertificate Kyc with all valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:86)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_UploadCInterCertificate_Misp_False_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partner, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_Misp_False_Valid_Smoke_sid_partnerId$", "certificateData": "$MISPINTERCERT$", "requesttime": "$TIMESTAMP$" }, output= { "status": "Upload Success." }, inputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificate, outputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=upload CACertificate Misp false valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:86)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_UploadCInterCertificate_Misp_S2_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partner, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_Misp_S2_Valid_Smoke_sid_partnerId$", "certificateData": "$MISPINTERCERT$", "requesttime": "$TIMESTAMP$" }, output= { "status": "Upload Success." }, inputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificate, outputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=upload CACertificate Misp S2 valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:86)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_UploadCInterCertificate_Misp_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partner, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_Misp_Valid_Smoke_sid_partnerId$", "certificateData": "$MISPINTERCERT$", "requesttime": "$TIMESTAMP$" }, output= { "status": "Upload Success." }, inputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificate, outputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=upload CACertificate Misp valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:86)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_UploadCInterCertificate_NonAuth_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partner, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_NonAuth_All_Valid_Smoke_sid_partnerId$", "certificateData": "$INTERCERT$", "requesttime": "$TIMESTAMP$" }, output= { "status": "Upload Success." }, inputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificate, outputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=upload CACertificate NonAuth all valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:86)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_UploadPartnerCert_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/upload, role=partner, templateFields=null, input={ "certificateData": "$PARTNERCERT$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requesttime": "$TIMESTAMP$" }, output= { "errors": "$IGNORE$" }, inputTemplate=esignet/PmsIntegration/UploadCert/uploadCert, outputTemplate=esignet/PmsIntegration/UploadCert/uploadCertResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Upload partner certificate with all valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:91)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_UploadPartnerCert_Auth_False_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/upload, role=partner, templateFields=null, input={ "certificateData": "$MISPPARTNERCERT$", "partnerId": "$ID:PartnerSelfRegistration_Auth_False_Valid_Smoke_sid_partnerId$", "requesttime": "$TIMESTAMP$" }, output= { "errors": "$IGNORE$" }, inputTemplate=esignet/PmsIntegration/UploadCert/uploadCert, outputTemplate=esignet/PmsIntegration/UploadCert/uploadCertResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Upload partner certificate Auth false valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:91)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_UploadPartnerCert_Auth_S2_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/upload, role=partner, templateFields=null, input={ "certificateData": "$MISPPARTNERCERT$", "partnerId": "$ID:PartnerSelfRegistration_Auth_S2_Valid_Smoke_sid_partnerId$", "requesttime": "$TIMESTAMP$" }, output= { "errors": "$IGNORE$" }, inputTemplate=esignet/PmsIntegration/UploadCert/uploadCert, outputTemplate=esignet/PmsIntegration/UploadCert/uploadCertResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Upload partner certificate Auth S2 valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:91)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_UploadPartnerCert_Kyc_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/upload, role=partner, templateFields=null, input={ "certificateData": "$PARTNERCERT$", "partnerId": "$ID:PartnerSelfRegistration_Kyc_Valid_Smoke_sid_partnerId$", "requesttime": "$TIMESTAMP$" }, output= { "errors": "$IGNORE$" }, inputTemplate=esignet/PmsIntegration/UploadCert/uploadCert, outputTemplate=esignet/PmsIntegration/UploadCert/uploadCertResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Upload partner certificate Kyc all valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:91)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_UploadPartnerCert_Misp_False_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/upload, role=partner, templateFields=null, input={ "certificateData": "$MISPPARTNERCERT$", "partnerId": "$ID:PartnerSelfRegistration_Misp_False_Valid_Smoke_sid_partnerId$", "requesttime": "$TIMESTAMP$" }, output= { "errors": "$IGNORE$" }, inputTemplate=esignet/PmsIntegration/UploadCert/uploadCert, outputTemplate=esignet/PmsIntegration/UploadCert/uploadCertResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Upload partner certificate Misp false valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:91)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_UploadPartnerCert_Misp_S2_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/upload, role=partner, templateFields=null, input={ "certificateData": "$MISPPARTNERCERT$", "partnerId": "$ID:PartnerSelfRegistration_Misp_S2_Valid_Smoke_sid_partnerId$", "requesttime": "$TIMESTAMP$" }, output= { "errors": "$IGNORE$" }, inputTemplate=esignet/PmsIntegration/UploadCert/uploadCert, outputTemplate=esignet/PmsIntegration/UploadCert/uploadCertResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Upload partner certificate Misp S2 valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:91)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_UploadPartnerCert_Misp_Valid_Smoke_sid, endPoint=/v1/partnermanager/partners/certificate/upload, role=partner, templateFields=null, input={ "certificateData": "$MISPPARTNERCERT$", "partnerId": "$ID:PartnerSelfRegistration_Misp_Valid_Smoke_sid_partnerId$", "requesttime": "$TIMESTAMP$" }, output= { "errors": "$IGNORE$" }, inputTemplate=esignet/PmsIntegration/UploadCert/uploadCert, outputTemplate=esignet/PmsIntegration/UploadCert/uploadCertResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Upload partner certificate Misp valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:91)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_UploadPartnerCert_NonAuth_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/upload, role=partner, templateFields=null, input={ "certificateData": "$PARTNERCERT$", "partnerId": "$ID:PartnerSelfRegistration_NonAuth_All_Valid_Smoke_sid_partnerId$", "requesttime": "$TIMESTAMP$" }, output= { "errors": "$IGNORE$" }, inputTemplate=esignet/PmsIntegration/UploadCert/uploadCert, outputTemplate=esignet/PmsIntegration/UploadCert/uploadCertResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Upload partner certificate NonAuth all valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:91)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_updatePartnerCertificate_StatusCode_AuthDemoUrl_All_Valid_Smoke, endPoint=/v1/identity/updatePartnerCertificate, role=partner, templateFields=null, input={ "certData": "$ID:UploadPartnerCert_Misp_Valid_Smoke_sid_signedCertificateData$", "partnerType": "MISP", "partnerName": "$ID:PartnerSelfRegistration_Misp_Valid_Smoke_sid_partnerId$", "keyFileNameByPartnerName": "true", "moduleName": "esignet" }, output=200, inputTemplate=esignet/PmsIntegration/UpdatePartnerCertificate/updatePartnerCertificate, outputTemplate=esignet/PmsIntegration/UpdatePartnerCertificate/updatePartnerCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update partner certificate statusCode AuthDemoUrl all valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.PostWithBodyAndQueryParamsForAutoGenId.test(PostWithBodyAndQueryParamsForAutoGenId.java:71)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_SubmitPartnerApiKeyRequest_Kyc_Rejection_All_Valid_Smoke_sid, endPoint=/v1/partnermanager/partners/$ID:PartnerSelfRegistration_Kyc_Valid_Smoke_sid_partnerId$/policy/map, role=partner, templateFields=null, input={ "policyName": "$ID:DefinePolicy_Auth_Valid_Smoke_sid_name$", "useCaseDescription": "Need to submit the payment", "requesttime": "$TIMESTAMP$" }, output={ "mappingkey": "$IGNORE$", "message": "Policy mapping request submitted successfully." }, inputTemplate=esignet/PmsIntegration/RequestAPIKey/requestApiKey, outputTemplate=esignet/PmsIntegration/RequestAPIKey/requestAPIKeyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Submit partner Api Key request Kyc rejection all valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:91)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_SubmitPartnerApiKeyRequest_Rejection_All_Valid_Smoke_sid, endPoint=/v1/partnermanager/partners/$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$/policy/map, role=partner, templateFields=null, input={ "policyName": "$ID:DefinePolicy_All_Valid_Smoke_sid_name$", "useCaseDescription": "Need to submit the payment", "requesttime": "$TIMESTAMP$" }, output={ "mappingkey": "$IGNORE$", "message": "Policy mapping request submitted successfully." }, inputTemplate=esignet/PmsIntegration/RequestAPIKey/requestApiKey, outputTemplate=esignet/PmsIntegration/RequestAPIKey/requestAPIKeyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Submit partner Api Key request rejection all valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:91)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_SubmitPartnerApiKeyRequest_Rejection_Auth_False_Valid_Smoke_sid, endPoint=/v1/partnermanager/partners/$ID:PartnerSelfRegistration_Auth_False_Valid_Smoke_sid_partnerId$/policy/map, role=partner, templateFields=null, input={ "policyName": "$ID:DefinePolicy_Auth_False_Valid_Smoke_sid_name$", "useCaseDescription": "Need submit the payment", "requesttime": "$TIMESTAMP$" }, output={ "mappingkey": "$IGNORE$", "message": "Policy mapping request submitted successfully." }, inputTemplate=esignet/PmsIntegration/RequestAPIKey/requestApiKey, outputTemplate=esignet/PmsIntegration/RequestAPIKey/requestAPIKeyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Submit partner Api Key request rejection Auth false valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:91)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_SubmitPartnerApiKeyRequest_Rejection_Misp_False_Valid_Smoke_sid, endPoint=/v1/partnermanager/partners/$ID:PartnerSelfRegistration_Misp_False_Valid_Smoke_sid_partnerId$/policy/map, role=partner, templateFields=null, input={ "policyName": "$ID:DefinePolicy_Misp_False_Valid_Smoke_sid_name$", "useCaseDescription": "Need submit the payment", "requesttime": "$TIMESTAMP$" }, output={ "mappingkey": "$IGNORE$", "message": "Policy mapping request submitted successfully." }, inputTemplate=esignet/PmsIntegration/RequestAPIKey/requestApiKey, outputTemplate=esignet/PmsIntegration/RequestAPIKey/requestAPIKeyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Submit partner Api Key request rejection Misp false valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:91)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_SubmitPartnerApiKeyRequest_Rejection_Misp_Valid_Smoke_sid, endPoint=/v1/partnermanager/partners/$ID:PartnerSelfRegistration_Misp_Valid_Smoke_sid_partnerId$/policy/map, role=partner, templateFields=null, input={ "policyName": "$ID:DefinePolicy_Misp_Valid_Smoke_sid_name$", "useCaseDescription": "Need submit the payment", "requesttime": "$TIMESTAMP$" }, output={ "mappingkey": "$IGNORE$", "message": "Policy mapping request submitted successfully." }, inputTemplate=esignet/PmsIntegration/RequestAPIKey/requestApiKey, outputTemplate=esignet/PmsIntegration/RequestAPIKey/requestAPIKeyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Submit partner Api Key request rejection Misp valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:91)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_SubmitPartnerApiKeyRequest_Rejection_NonAuth_All_Valid_Smoke_sid, endPoint=/v1/partnermanager/partners/$ID:PartnerSelfRegistration_NonAuth_All_Valid_Smoke_sid_partnerId$/policy/map, role=partner, templateFields=null, input={ "policyName": "$ID:DefinePolicy_NonAuth_All_Valid_Smoke_sid_name$", "useCaseDescription": "Need to submit the payment", "requesttime": "$TIMESTAMP$" }, output={ "mappingkey": "$IGNORE$", "message": "Policy mapping request submitted successfully." }, inputTemplate=esignet/PmsIntegration/RequestAPIKey/requestApiKey, outputTemplate=esignet/PmsIntegration/RequestAPIKey/requestAPIKeyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Submit partner Api Key request rejection NonAuth all valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:91)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_ApproveRejectPartnerAPIKeyReq_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/policy/{mappingkey}, role=partner, templateFields=null, input={ "status": "Approved", "mappingkey": "$ID:SubmitPartnerApiKeyRequest_Rejection_All_Valid_Smoke_sid_mappingkey$", "requesttime": "$TIMESTAMP$" }, output={ "response": "Policy mapping approved successfully" }, inputTemplate=esignet/PmsIntegration/ApproveAPIKey/approveAPIKey, outputTemplate=esignet/PmsIntegration/ApproveAPIKey/approveAPIKeyResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approve or Reject partner Api key request all valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.PutWithPathParamsAndBody.test(PutWithPathParamsAndBody.java:85)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_ApproveRejectPartnerAPIKeyReq_Auth_False_Valid_Smoke, endPoint=/v1/partnermanager/partners/policy/{mappingkey}, role=partner, templateFields=null, input={ "status": "Approved", "mappingkey": "$ID:SubmitPartnerApiKeyRequest_Rejection_Auth_False_Valid_Smoke_sid_mappingkey$", "requesttime": "$TIMESTAMP$" }, output={ "response": "Policy mapping approved successfully" }, inputTemplate=esignet/PmsIntegration/ApproveAPIKey/approveAPIKey, outputTemplate=esignet/PmsIntegration/ApproveAPIKey/approveAPIKeyResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approve or Reject partner Api key request Auth false valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.PutWithPathParamsAndBody.test(PutWithPathParamsAndBody.java:85)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_ApproveRejectPartnerAPIKeyReq_Kyc_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/policy/{mappingkey}, role=partner, templateFields=null, input={ "status": "Approved", "mappingkey": "$ID:SubmitPartnerApiKeyRequest_Kyc_Rejection_All_Valid_Smoke_sid_mappingkey$", "requesttime": "$TIMESTAMP$" }, output={ "response": "Policy mapping approved successfully" }, inputTemplate=esignet/PmsIntegration/ApproveAPIKey/approveAPIKey, outputTemplate=esignet/PmsIntegration/ApproveAPIKey/approveAPIKeyResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approve or Reject partner Api key request Kyc all valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.PutWithPathParamsAndBody.test(PutWithPathParamsAndBody.java:85)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_ApproveRejectPartnerAPIKeyReq_Misp_False_Valid_Smoke, endPoint=/v1/partnermanager/partners/policy/{mappingkey}, role=partner, templateFields=null, input={ "status": "Approved", "mappingkey": "$ID:SubmitPartnerApiKeyRequest_Rejection_Misp_False_Valid_Smoke_sid_mappingkey$", "requesttime": "$TIMESTAMP$" }, output={ "response": "Policy mapping approved successfully" }, inputTemplate=esignet/PmsIntegration/ApproveAPIKey/approveAPIKey, outputTemplate=esignet/PmsIntegration/ApproveAPIKey/approveAPIKeyResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approve or Reject partner Api key request Misp false valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.PutWithPathParamsAndBody.test(PutWithPathParamsAndBody.java:85)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_ApproveRejectPartnerAPIKeyReq_Misp_Valid_Smoke, endPoint=/v1/partnermanager/partners/policy/{mappingkey}, role=partner, templateFields=null, input={ "status": "Approved", "mappingkey": "$ID:SubmitPartnerApiKeyRequest_Rejection_Misp_Valid_Smoke_sid_mappingkey$", "requesttime": "$TIMESTAMP$" }, output={ "response": "Policy mapping approved successfully" }, inputTemplate=esignet/PmsIntegration/ApproveAPIKey/approveAPIKey, outputTemplate=esignet/PmsIntegration/ApproveAPIKey/approveAPIKeyResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approve or Reject partner Api key request Misp valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.PutWithPathParamsAndBody.test(PutWithPathParamsAndBody.java:85)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_ApproveRejectPartnerAPIKeyReq_NonAuth_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/policy/{mappingkey}, role=partner, templateFields=null, input={ "status": "Approved", "mappingkey": "$ID:SubmitPartnerApiKeyRequest_Rejection_NonAuth_All_Valid_Smoke_sid_mappingkey$", "requesttime": "$TIMESTAMP$" }, output={ "response": "Policy mapping approved successfully" }, inputTemplate=esignet/PmsIntegration/ApproveAPIKey/approveAPIKey, outputTemplate=esignet/PmsIntegration/ApproveAPIKey/approveAPIKeyResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approve or Reject partner Api key request NonAuth all valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.PutWithPathParamsAndBody.test(PutWithPathParamsAndBody.java:85)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_UpdatePolicy__AfterPublished_Neg, endPoint=/v1/policymanager/policies/{policyId}, role=partner, templateFields=null, input={ "desc": "$POLICYDESC$", "name": "$POLICYNAME$", "policyGroupName": "$ID:DefinePolicyGroup_All_Valid_Smoke_sid_name$", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_sid_id$" }, output= { "errors": [ { "errorCode": "PMS_POL_055" } ] }, inputTemplate=esignet/PmsIntegration/UpdatePolicy/UpdatePolicy, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update policy after published, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.PutWithPathParamsAndBody.test(PutWithPathParamsAndBody.java:85)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_DeactivatePolicy_After_Publish_Neg, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}, role=partner, templateFields=null, input={ "policygroupId": "$ID:DefinePolicyGroup_All_Valid_Smoke_sid_id$", "policyId": "$ID:DefinePolicy_NonAuth_All_Valid_Smoke_sid_id$", "requesttime": "$TIMESTAMP$", "status": "De-active" }, output= { "errors": [ { "errorCode": "PMS_POL_058" } ] }, inputTemplate=esignet/PmsIntegration/DeactivatePolicy/DeactivatePolicy, outputTemplate=esignet/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate policy after published, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.PatchWithPathParamsAndBody.test(PatchWithPathParamsAndBody.java:82)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_GenerateMispLK_All_Valid_Smoke_sid, endPoint=/v1/partnermanager/misps, role=partner, templateFields=null, input={ "providerId": "$ID:PartnerSelfRegistration_Misp_Valid_Smoke_sid_partnerId$", "requesttime": "$TIMESTAMP$" }, output= { }, inputTemplate=esignet/PmsIntegration/GenerateMispLK/GenerateMispLK, outputTemplate=esignet/PmsIntegration/GenerateMispLK/GenerateMispLKResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Generate MispLk all valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:91)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_GenerateMispLK_Misp_False_Valid_Smoke_sid, endPoint=/v1/partnermanager/misps, role=partner, templateFields=null, input={ "providerId": "$ID:PartnerSelfRegistration_Misp_False_Valid_Smoke_sid_partnerId$", "requesttime": "$TIMESTAMP$" }, output= { }, inputTemplate=esignet/PmsIntegration/GenerateMispLK/GenerateMispLK, outputTemplate=esignet/PmsIntegration/GenerateMispLK/GenerateMispLKResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Generate MispLk Misp false valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:91)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_GenerateMispLK_Misp_S2_Valid_Smoke_sid, endPoint=/v1/partnermanager/misps, role=partner, templateFields=null, input={ "providerId": "$ID:PartnerSelfRegistration_Misp_S2_Valid_Smoke_sid_partnerId$", "requesttime": "$TIMESTAMP$" }, output= { }, inputTemplate=esignet/PmsIntegration/GenerateMispLK/GenerateMispLK, outputTemplate=esignet/PmsIntegration/GenerateMispLK/GenerateMispLKResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Generate MispLk Misp S2 valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:91)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateApiKeyKyc_Valid_Smoke_sid, endPoint=/v1/partnermanager/partners/$ID:PartnerSelfRegistration_Kyc_Valid_Smoke_sid_partnerId$/generate/apikey, role=esignetpartnerkyc, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "policyName": "$ID:DefinePolicy_Auth_Valid_Smoke_sid_name$", "label": "ABCD" }, output={ }, inputTemplate=esignet/GenerateApiKey/GenerateApiKey, outputTemplate=esignet/GenerateApiKey/GenerateApiKeyResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Generate Api key Kyc valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePatchForAutoGenId.test(SimplePatchForAutoGenId.java:84)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateApiKey_Valid_Smoke_sid, endPoint=/v1/partnermanager/partners/$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$/generate/apikey, role=esignetpartner, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "policyName": "$ID:DefinePolicy_All_Valid_Smoke_sid_name$", "label": "ABCD" }, output={ }, inputTemplate=esignet/GenerateApiKey/GenerateApiKey, outputTemplate=esignet/GenerateApiKey/GenerateApiKeyResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Generate Api key with valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePatchForAutoGenId.test(SimplePatchForAutoGenId.java:84)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_CreateOIDCClient_Auth_False_Valid_Smoke_sid, endPoint=/v1/partnermanager/oidc/client, role=partner, templateFields=null, input={ "name": "$RANDOMID$", "policyId": "$ID:DefinePolicy_Auth_False_Valid_Smoke_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "$ID:PartnerSelfRegistration_Auth_False_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "clientId": "$IGNORE$", "status": "ACTIVE" }, inputTemplate=esignet/OidcClient/OIDCClient, outputTemplate=esignet/OidcClient/OIDCClientResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create OIDC client Auth false valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:91)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_CreateOIDCClient_Auth_S2_Valid_Smoke_sid, endPoint=/v1/partnermanager/oidc/client, role=partner, templateFields=null, input={ "name": "$RANDOMID$", "policyId": "$ID:DefinePolicy_Auth_S2_Valid_Smoke_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "$ID:PartnerSelfRegistration_Auth_S2_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_PRT_061", "message": "Partner policy mapping not exists." } ] }, inputTemplate=esignet/OidcClient/OIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create OIDC client Auth S2 valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:91)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_CreateOIDCClient_InValid_Partner_sid, endPoint=/v1/partnermanager/oidc/client, role=partner, templateFields=null, input={ "name": "$RANDOMID$", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_sid_id$", "publicKey": "$OIDCJWKKEY2$", "authPartnerId": "sjsjjsjsjsjsjjs", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_PRT_058", "message": "Partner policy mapping not exists." } ] }, inputTemplate=esignet/OidcClient/OIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create OIDC client with invalid partner, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:91)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_CreateOIDCClient_InValid_logoUri_sid, endPoint=/v1/partnermanager/oidc/client, role=partner, templateFields=null, input={ "name": "$RANDOMID$", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_sid_id$", "publicKey": "$OIDCJWKKEY2$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "djxjdjjdjdpng.cndi", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_COR_001", "message": "Invalid request parameter - must be a valid URL :request.logoUri" } ] }, inputTemplate=esignet/OidcClient/OIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create OIDC client with invalid logoUri, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:91)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_CreateOIDCClient_Misp_Valid_Smoke_sid, endPoint=/v1/partnermanager/oidc/client, role=partner, templateFields=null, input={ "name": "$RANDOMID$", "policyId": "$ID:DefinePolicy_Auth_Valid_Smoke_sid_id$", "publicKey": "$OIDCJWKKEY3$", "authPartnerId": "$ID:PartnerSelfRegistration_Kyc_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "clientId": "$IGNORE$", "status": "ACTIVE" }, inputTemplate=esignet/OidcClient/OIDCClient, outputTemplate=esignet/OidcClient/OIDCClientResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create OIDC client Misp valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:91)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_CreateOIDCClient_NonAuth_all_Valid_Smoke_sid, endPoint=/v1/partnermanager/oidc/client, role=partner, templateFields=null, input={ "name": "$RANDOMID$", "policyId": "$ID:DefinePolicy_NonAuth_All_Valid_Smoke_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "$ID:PartnerSelfRegistration_NonAuth_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "clientId": "$IGNORE$", "status": "ACTIVE" }, inputTemplate=esignet/OidcClient/OIDCClient, outputTemplate=esignet/OidcClient/OIDCClientResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create OIDC client NonAuth all valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:91)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_CreateOIDCClient_all_Valid_Smoke_sid, endPoint=/v1/partnermanager/oidc/client, role=partner, templateFields=null, input={ "name": "$RANDOMID$", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_sid_id$", "publicKey": "$OIDCJWKKEY$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "clientId": "$IGNORE$", "status": "ACTIVE" }, inputTemplate=esignet/OidcClient/OIDCClient, outputTemplate=esignet/OidcClient/OIDCClientResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create OIDC client with all valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:91)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_CreateOIDCClient_blank_authPartnerId_sid, endPoint=/v1/partnermanager/oidc/client, role=partner, templateFields=null, input={ "name": "$RANDOMID$", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_sid_id$", "publicKey": "$OIDCJWKKEY2$", "authPartnerId": "263636gdgdg", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_PRT_058", "message": "Partner policy mapping not exists." } ] }, inputTemplate=esignet/OidcClient/OIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create OIDC client blank authpartnerId, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:91)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_CreateOIDCClient_inValid_authPartnerId_sid, endPoint=/v1/partnermanager/oidc/client, role=partner, templateFields=null, input={ "name": "$RANDOMID$", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_sid_id$", "publicKey": "$OIDCJWKKEY2$", "authPartnerId": "263636gdgdg", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_PRT_058", "message": "Partner policy mapping not exists." } ] }, inputTemplate=esignet/OidcClient/OIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create OIDC client with invalid authpartnerId, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:91)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_CreateOIDCClient_max_authPartnerId_Neg, endPoint=/v1/partnermanager/oidc/client, role=partner, templateFields=null, input={ "name": "$RANDOMID$", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_sid_id$", "publicKey": "$OIDCJWKKEY2$", "authPartnerId": "17777777777777777777777777hhhhhhhhhhhhhhhh7222222222222222222222hdddddd", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_PRT_058", "message": "$IGNORE$" } ] }, inputTemplate=esignet/OidcClient/OIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create OIDC client with exceeding maximum limit in authpartnerId, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:91)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_CreateOIDCClient_same_publickey_sid, endPoint=/v1/partnermanager/oidc/client, role=partner, templateFields=null, input={ "name": "$RANDOMID$", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_sid_id$", "publicKey": "$OIDCJWKKEY$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_IDP_001", "message": "Client public key already exists." } ] }, inputTemplate=esignet/OidcClient/OIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create OIDC client with same publicKey, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:91)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_CreateOIDCClient_with_empty_grantTypes_sid, endPoint=/v1/partnermanager/oidc/client, role=partner, templateFields=null, input={ "name": "$RANDOMID$", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_sid_id$", "publicKey": "$OIDCJWKKEY2$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_grant_type" } ] }, inputTemplate=esignet/OidcClient/OIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create OIDC client with empty grantTypes, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:91)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_CreateOIDCClient_with_invalid_clientAuthMethods_sid, endPoint=/v1/partnermanager/oidc/client, role=partner, templateFields=null, input={ "name": "$RANDOMID$", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_sid_id$", "publicKey": "$OIDCJWKKEY2$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "????%%%$$$" }, output={ "errors": [ { "errorCode": "invalid_client_auth" } ] }, inputTemplate=esignet/OidcClient/OIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create OIDC client with invalid clientAuthMethods, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:91)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_CreateOIDCClient_with_invalid_grantTypes_sid, endPoint=/v1/partnermanager/oidc/client, role=partner, templateFields=null, input={ "name": "$RANDOMID$", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_sid_id$", "publicKey": "$OIDCJWKKEY2$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "ahshdbdbchhd", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_grant_type" } ] }, inputTemplate=esignet/OidcClient/OIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create OIDC client with invalid grantTypes, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:91)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_CreateOIDCClient_with_invalid_policy_sid, endPoint=/v1/partnermanager/oidc/client, role=partner, templateFields=null, input={ "name": "$RANDOMID$", "policyId": "ahajajaj123", "publicKey": "$OIDCJWKKEY2$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_PRT_073", "message": "Policy not exists." } ] }, inputTemplate=esignet/OidcClient/OIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create OIDC client with invalid policy, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:91)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_CreateOIDCClient_with_maxm_char_logouri_sid, endPoint=/v1/partnermanager/oidc/client, role=partner, templateFields=null, input={ "name": "$RANDOMID$", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_sid_id$", "publicKey": "$OIDCJWKKEY2$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "dgdnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnndddddddhhhhhhhhhhhhhhhhhhhhhhhhhhhhhheeeeeehhhhhhhhhhyyyyy", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_COR_001", "message": "Invalid request parameter - must be a valid URL :request.logoUri" } ] }, inputTemplate=esignet/OidcClient/OIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create OIDC client with maximum character in logouri, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:91)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_CreateOIDCClient_with_null_grantTypes_sid, endPoint=/v1/partnermanager/oidc/client, role=partner, templateFields=null, input={ "name": "$RANDOMID$", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_sid_id$", "publicKey": "$OIDCJWKKEY2$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "null", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_grant_type" } ] }, inputTemplate=esignet/OidcClient/OIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create OIDC client with null grantTypes, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:91)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_CreateOIDCClient_with_null_oidc_sid, endPoint=/v1/partnermanager/oidc/client, role=partner, templateFields=null, input={ "name": "", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_sid_id$", "publicKey": "$OIDCJWKKEY2$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_COR_001", "message": "Invalid request parameter - must not be blank :request.name" } ] }, inputTemplate=esignet/OidcClient/OIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create OIDC client with null oidc, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:91)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_CreateOIDCClient_with_null_policy_sid, endPoint=/v1/partnermanager/oidc/client, role=partner, templateFields=null, input={ "name": "$RANDOMID$", "policyId": "", "publicKey": "$OIDCJWKKEY2$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_COR_001", "message": "Invalid request parameter - must not be blank :request.policyId" } ] }, inputTemplate=esignet/OidcClient/OIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create OIDC client with null policy, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:91)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_CreateOIDCClient_without_redirecturi_sid, endPoint=/v1/partnermanager/oidc/client, role=partner, templateFields=null, input={ "name": "$RANDOMID$", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_sid_id$", "publicKey": "$OIDCJWKKEY2$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_redirect_uri" } ] }, inputTemplate=esignet/OidcClient/OIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create OIDC client without redirecturi, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:91)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_UpdateOIDC_Invalid_clientId_Neg, endPoint=/v1/partnermanager/oidc/client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "status": "ACTIVE", "grantTypes": "authorization_code", "clientName": "MOSIP OIDC Client", "clientId": "$DFDFF@#$", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_IDP_004" } ] }, inputTemplate=esignet/UpdateOIDC/UpdateOIDC, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update OIDC client with invalid clientId, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.PutWithPathParamsAndBody.test(PutWithPathParamsAndBody.java:85)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_UpdateOIDC_all_Valid_Smoke, endPoint=/v1/partnermanager/oidc/client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "status": "ACTIVE", "grantTypes": "authorization_code", "clientName": "MOSIP OIDC Client", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "clientAuthMethods": "private_key_jwt" }, output={ "clientId": "$IGNORE$", "status": "ACTIVE" }, inputTemplate=esignet/UpdateOIDC/UpdateOIDC, outputTemplate=esignet/UpdateOIDC/UpdateOIDCResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update OIDC client with all valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.PutWithPathParamsAndBody.test(PutWithPathParamsAndBody.java:85)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_GetOidcClient_Invalid_clientId_Neg, endPoint=/v1/partnermanager/oidc/client/{client_id}, role=resident, templateFields=null, input={ "client_id": "$sjdh@#$" }, output={ "errors": [ { "errorCode": "PMS_IDP_004", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/GetOidcClient/GetOidcClient, outputTemplate=esignet/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get OIDC client with invalid clientId, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.GetWithParam.test(GetWithParam.java:86)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Esignet_GetOidcClient_all_Valid_Smoke, endPoint=/v1/partnermanager/oidc/client/{client_id}, role=resident, templateFields=null, input={ "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$" }, output={ }, inputTemplate=esignet/GetOidcClient/GetOidcClient, outputTemplate=esignet/GetOidcClient/GetOidcClientResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Get OIDC client with all valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.GetWithParam.test(GetWithParam.java:86)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignetRes_Generate_Onetimeuse2_VID_Valid_Smoke_sid, endPoint=/resident/v1/vid, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "$ID:AddIdentity_Vid_2_Generation_smoke_Pos_UIN$", "individualIdType": "UIN", "requesttime": "$TIMESTAMP$", "id": "mosip.resident.vid", "version": "v1", "vidType": "onetimeuse", "otp": "$ID:AddIdentity_Vid_2_Generation_smoke_Pos_EMAIL$", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Vid_2_Generation_smoke_Pos_UIN$", "individualIdType": "UIN", "sendOtpReqTemplate": "esignet/SendOTPRes/createSendOTP", "sendOtpEndPoint": "/resident/v1/req/otp" } }, output={ "vid": "$IGNORE$", "message": "$IGNORE$", "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOTPRes/createSendOTPResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/GenerateVID/createGenerateVID, outputTemplate=esignet/GenerateVID/createGenerateVIDResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Generate Onetimeuse2 VID valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:88)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignetRes_Generate_Onetimeuse_VID_Invalid_Scen_Valid_Smoke_sid, endPoint=/resident/v1/vid, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "individualIdType": "UIN", "requesttime": "$TIMESTAMP$", "id": "mosip.resident.vid", "version": "v1", "vidType": "onetimeuse", "otp": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "individualIdType": "UIN", "sendOtpReqTemplate": "esignet/SendOTPRes/createSendOTP", "sendOtpEndPoint": "/resident/v1/req/otp" } }, output={ "vid": "$IGNORE$", "message": "$IGNORE$", "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOTPRes/createSendOTPResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/GenerateVID/createGenerateVID, outputTemplate=esignet/GenerateVID/createGenerateVIDResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Generate Onetimeuse VID invalid scen valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:88)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignetRes_Generate_Onetimeuse_VID_Valid_Smoke_sid, endPoint=/resident/v1/vid, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "$ID:AddIdentity_Vid_Generation_smoke_Pos_UIN$", "individualIdType": "UIN", "requesttime": "$TIMESTAMP$", "id": "mosip.resident.vid", "version": "v1", "vidType": "onetimeuse", "otp": "$ID:AddIdentity_Vid_Generation_smoke_Pos_EMAIL$", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Vid_Generation_smoke_Pos_UIN$", "individualIdType": "UIN", "sendOtpReqTemplate": "esignet/SendOTPRes/createSendOTP", "sendOtpEndPoint": "/resident/v1/req/otp" } }, output={ "vid": "$IGNORE$", "message": "$IGNORE$", "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOTPRes/createSendOTPResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/GenerateVID/createGenerateVID, outputTemplate=esignet/GenerateVID/createGenerateVIDResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Generate Onetimeuse VID with valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:88)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignetRes_Generate_Perpetual2_VID_Valid_Smoke_sid, endPoint=/resident/v1/vid, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "$ID:AddIdentity_Vid_2_Generation_smoke_Pos_UIN$", "individualIdType": "UIN", "requesttime": "$TIMESTAMP$", "id": "mosip.resident.vid", "version": "v1", "vidType": "Perpetual", "otp": "$ID:AddIdentity_Vid_2_Generation_smoke_Pos_EMAIL$", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Vid_2_Generation_smoke_Pos_UIN$", "individualIdType": "UIN", "sendOtpReqTemplate": "esignet/SendOTPRes/createSendOTP", "sendOtpEndPoint": "/resident/v1/req/otp" } }, output={ "vid": "$IGNORE$", "message": "$IGNORE$", "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOTPRes/createSendOTPResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/GenerateVID/createGenerateVID, outputTemplate=esignet/GenerateVID/createGenerateVIDResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Generate perpetual2 VID with valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:88)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignetRes_Generate_Perpetual_VID_Consent_Valid_Smoke_sid, endPoint=/resident/v1/vid, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "$ID:AddIdentity_Consent_Vid_smoke_Pos_UIN$", "individualIdType": "UIN", "requesttime": "$TIMESTAMP$", "id": "mosip.resident.vid", "version": "v1", "vidType": "Perpetual", "otp": "$ID:AddIdentity_Consent_Vid_smoke_Pos_EMAIL$", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Consent_Vid_smoke_Pos_UIN$", "individualIdType": "UIN", "sendOtpReqTemplate": "esignet/SendOTPRes/createSendOTP", "sendOtpEndPoint": "/resident/v1/req/otp" } }, output={ "vid": "$IGNORE$", "message": "$IGNORE$", "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOTPRes/createSendOTPResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/GenerateVID/createGenerateVID, outputTemplate=esignet/GenerateVID/createGenerateVIDResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Generate perpetual VID consent valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:88)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignetRes_Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid, endPoint=/resident/v1/vid, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "individualIdType": "UIN", "requesttime": "$TIMESTAMP$", "id": "mosip.resident.vid", "version": "v1", "vidType": "Perpetual", "otp": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "individualIdType": "UIN", "sendOtpReqTemplate": "esignet/SendOTPRes/createSendOTP", "sendOtpEndPoint": "/resident/v1/req/otp" } }, output={ "vid": "$IGNORE$", "message": "$IGNORE$", "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOTPRes/createSendOTPResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/GenerateVID/createGenerateVID, outputTemplate=esignet/GenerateVID/createGenerateVIDResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Generate perpetual VID with invalid scenario, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:88)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignetRes_Generate_Perpetual_VID_Kyc_Valid_Smoke_sid, endPoint=/resident/v1/vid, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "$ID:AddIdentity_KycAuth_smoke_Pos_UIN$", "individualIdType": "UIN", "requesttime": "$TIMESTAMP$", "id": "mosip.resident.vid", "version": "v1", "vidType": "Perpetual", "otp": "$ID:AddIdentity_KycAuth_smoke_Pos_EMAIL$", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_KycAuth_smoke_Pos_UIN$", "individualIdType": "UIN", "sendOtpReqTemplate": "esignet/SendOTPRes/createSendOTP", "sendOtpEndPoint": "/resident/v1/req/otp" } }, output={ "vid": "$IGNORE$", "message": "$IGNORE$", "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOTPRes/createSendOTPResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/GenerateVID/createGenerateVID, outputTemplate=esignet/GenerateVID/createGenerateVIDResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Generate perpetual VID Kyc valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:88)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignetRes_Generate_Perpetual_VID_LinkedSce_Valid_Smoke_sid, endPoint=/resident/v1/vid, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "$ID:AddIdentity_Linked_Sce_smoke_Pos_UIN$", "individualIdType": "UIN", "requesttime": "$TIMESTAMP$", "id": "mosip.resident.vid", "version": "v1", "vidType": "Perpetual", "otp": "$ID:AddIdentity_Linked_Sce_smoke_Pos_EMAIL$", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Linked_Sce_smoke_Pos_UIN$", "individualIdType": "UIN", "sendOtpReqTemplate": "esignet/SendOTPRes/createSendOTP", "sendOtpEndPoint": "/resident/v1/req/otp" } }, output={ "vid": "$IGNORE$", "message": "$IGNORE$", "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOTPRes/createSendOTPResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/GenerateVID/createGenerateVID, outputTemplate=esignet/GenerateVID/createGenerateVIDResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Generate perpetual VID Linkedsce valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:88)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignetRes_Generate_Perpetual_VID_Linked_Consent_User2_Valid_Smoke_sid, endPoint=/resident/v1/vid, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "$ID:AddIdentity_Linked_Consent_User2_Vid_smoke_Pos_UIN$", "individualIdType": "UIN", "requesttime": "$TIMESTAMP$", "id": "mosip.resident.vid", "version": "v1", "vidType": "Perpetual", "otp": "$ID:AddIdentity_Linked_Consent_User2_Vid_smoke_Pos_EMAIL$", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Linked_Consent_User2_Vid_smoke_Pos_UIN$", "individualIdType": "UIN", "sendOtpReqTemplate": "esignet/SendOTPRes/createSendOTP", "sendOtpEndPoint": "/resident/v1/req/otp" } }, output={ "vid": "$IGNORE$", "message": "$IGNORE$", "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOTPRes/createSendOTPResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/GenerateVID/createGenerateVID, outputTemplate=esignet/GenerateVID/createGenerateVIDResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Generate perpetual VID linked consent user2 valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:88)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignetRes_Generate_Perpetual_VID_Linked_Consent_Valid_Smoke_sid, endPoint=/resident/v1/vid, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "$ID:AddIdentity_Linked_Consent_Vid_smoke_Pos_UIN$", "individualIdType": "UIN", "requesttime": "$TIMESTAMP$", "id": "mosip.resident.vid", "version": "v1", "vidType": "Perpetual", "otp": "$ID:AddIdentity_Linked_Consent_Vid_smoke_Pos_EMAIL$", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Linked_Consent_Vid_smoke_Pos_UIN$", "individualIdType": "UIN", "sendOtpReqTemplate": "esignet/SendOTPRes/createSendOTP", "sendOtpEndPoint": "/resident/v1/req/otp" } }, output={ "vid": "$IGNORE$", "message": "$IGNORE$", "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOTPRes/createSendOTPResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/GenerateVID/createGenerateVID, outputTemplate=esignet/GenerateVID/createGenerateVIDResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Generate perpetual VID linked consent valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:88)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignetRes_Generate_Perpetual_VID_VCI_Invalid_Scen_Smoke_sid, endPoint=/resident/v1/vid, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "$ID:AddIdentity_Valid_Params_VCI_Vid_Inv_Scen_smoke_Pos_UIN$", "individualIdType": "UIN", "requesttime": "$TIMESTAMP$", "id": "mosip.resident.vid", "version": "v1", "vidType": "Perpetual", "otp": "$ID:AddIdentity_Valid_Params_VCI_Vid_Inv_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_VCI_Vid_Inv_Scen_smoke_Pos_UIN$", "individualIdType": "UIN", "sendOtpReqTemplate": "esignet/SendOTPRes/createSendOTP", "sendOtpEndPoint": "/resident/v1/req/otp" } }, output={ "vid": "$IGNORE$", "message": "$IGNORE$", "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOTPRes/createSendOTPResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/GenerateVID/createGenerateVID, outputTemplate=esignet/GenerateVID/createGenerateVIDResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Generate perpetual VID VCI with invalid scenario, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:88)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignetRes_Generate_Perpetual_VID_VCI_Valid_Smoke_sid, endPoint=/resident/v1/vid, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "$ID:AddIdentity_Valid_Params_VCI_uin_smoke_Pos_UIN$", "individualIdType": "UIN", "requesttime": "$TIMESTAMP$", "id": "mosip.resident.vid", "version": "v1", "vidType": "Perpetual", "otp": "$ID:AddIdentity_Valid_Params_VCI_uin_smoke_Pos_EMAIL$", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_VCI_uin_smoke_Pos_UIN$", "individualIdType": "UIN", "sendOtpReqTemplate": "esignet/SendOTPRes/createSendOTP", "sendOtpEndPoint": "/resident/v1/req/otp" } }, output={ "vid": "$IGNORE$", "message": "$IGNORE$", "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOTPRes/createSendOTPResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/GenerateVID/createGenerateVID, outputTemplate=esignet/GenerateVID/createGenerateVIDResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Generate perpetual VID VCI valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:88)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignetRes_Generate_Perpetual_VID_Valid_Smoke_sid, endPoint=/resident/v1/vid, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "$ID:AddIdentity_Vid_Generation_smoke_Pos_UIN$", "individualIdType": "UIN", "requesttime": "$TIMESTAMP$", "id": "mosip.resident.vid", "version": "v1", "vidType": "Perpetual", "otp": "$ID:AddIdentity_Vid_Generation_smoke_Pos_EMAIL$", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Vid_Generation_smoke_Pos_UIN$", "individualIdType": "UIN", "sendOtpReqTemplate": "esignet/SendOTPRes/createSendOTP", "sendOtpEndPoint": "/resident/v1/req/otp" } }, output={ "vid": "$IGNORE$", "message": "$IGNORE$", "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOTPRes/createSendOTPResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/GenerateVID/createGenerateVID, outputTemplate=esignet/GenerateVID/createGenerateVIDResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Generate perpetual VID with all valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:88)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignetRes_Generate_Temporary2_VID_Valid_Smoke_sid, endPoint=/resident/v1/vid, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "$ID:AddIdentity_Vid_2_Generation_smoke_Pos_UIN$", "individualIdType": "UIN", "requesttime": "$TIMESTAMP$", "id": "mosip.resident.vid", "version": "v1", "vidType": "Temporary", "otp": "$ID:AddIdentity_Vid_2_Generation_smoke_Pos_EMAIL$", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Vid_2_Generation_smoke_Pos_UIN$", "individualIdType": "UIN", "sendOtpReqTemplate": "esignet/SendOTPRes/createSendOTP", "sendOtpEndPoint": "/resident/v1/req/otp" } }, output={ "vid": "$IGNORE$", "message": "$IGNORE$", "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOTPRes/createSendOTPResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/GenerateVID/createGenerateVID, outputTemplate=esignet/GenerateVID/createGenerateVIDResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Generate temporary2 VID valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:88)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignetRes_Generate_Temporary_VID_Invalid_Scen_Valid_Smoke_sid, endPoint=/resident/v1/vid, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "individualIdType": "UIN", "requesttime": "$TIMESTAMP$", "id": "mosip.resident.vid", "version": "v1", "vidType": "Temporary", "otp": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "individualIdType": "UIN", "sendOtpReqTemplate": "esignet/SendOTPRes/createSendOTP", "sendOtpEndPoint": "/resident/v1/req/otp" } }, output={ "vid": "$IGNORE$", "message": "$IGNORE$", "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOTPRes/createSendOTPResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/GenerateVID/createGenerateVID, outputTemplate=esignet/GenerateVID/createGenerateVIDResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Generate temporary VID invalid scen valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:88)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignetRes_Generate_Temporary_VID_Valid_Smoke_sid, endPoint=/resident/v1/vid, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "$ID:AddIdentity_Vid_Generation_smoke_Pos_UIN$", "individualIdType": "UIN", "requesttime": "$TIMESTAMP$", "id": "mosip.resident.vid", "version": "v1", "vidType": "Temporary", "otp": "$ID:AddIdentity_Vid_Generation_smoke_Pos_EMAIL$", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Vid_Generation_smoke_Pos_UIN$", "individualIdType": "UIN", "sendOtpReqTemplate": "esignet/SendOTPRes/createSendOTP", "sendOtpEndPoint": "/resident/v1/req/otp" } }, output={ "vid": "$IGNORE$", "message": "$IGNORE$", "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOTPRes/createSendOTPResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/GenerateVID/createGenerateVID, outputTemplate=esignet/GenerateVID/createGenerateVIDResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Generate temporary VID with valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:88)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_CreateOIDCClient_Misp_Valid_Smoke_sid, endPoint=/v1/esignet/client-mgmt/oauth-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMIDFOROIDCCLIENT$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$OIDCJWKKEY3$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"},{acrValues: "mosip:idp:acr:password"},{acrValues: "mosip:idp:acr:linked-wallet"},{acrValues: "mosip:idp:acr:knowledge"},{acrValues: "mosip:idp:acr:id-token"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "MOSIP OIDC Client" }, output={ "clientId": "$IGNORE$", "status": "ACTIVE" }, inputTemplate=esignet/OIDCClientV2/OIDCClientV2, outputTemplate=esignet/OIDCClientV2/OIDCClientV2Result, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client V2 with all valid data, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_CreateOIDCClient_NonAuth_all_Valid_Smoke_sid, endPoint=/v1/esignet/client-mgmt/oauth-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMIDFOROIDCCLIENT$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "MOSIP OIDC Client" }, output={ "clientId": "$IGNORE$", "status": "ACTIVE" }, inputTemplate=esignet/OIDCClientV2/OIDCClientV2, outputTemplate=esignet/OIDCClientV2/OIDCClientV2Result, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client V2 with all valid data, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_CreateOIDCClient_all_Valid_Smoke_sid, endPoint=/v1/esignet/client-mgmt/oauth-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMIDFOROIDCCLIENT$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$OIDCJWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"},{acrValues: "mosip:idp:acr:password"},{acrValues: "mosip:idp:acr:linked-wallet"},{acrValues: "mosip:idp:acr:knowledge"},{acrValues: "mosip:idp:acr:id-token"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "MOSIP OIDC Client" }, output={ "clientId": "$IGNORE$", "status": "ACTIVE" }, inputTemplate=esignet/OIDCClientV2/OIDCClientV2, outputTemplate=esignet/OIDCClientV2/OIDCClientV2Result, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client V2 with all valid data, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_SendBindingOtp_Vid_Empty_IndividualId_Neg, endPoint=/v1/esignet/binding/binding-otp, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "invalid_identifier", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendBindingOtp/SendBindingOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Send binding Otp VID with empty individualId, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:97)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_SendBindingOtp_Vid_Empty_OtpChannels_Neg, endPoint=/v1/esignet/binding/binding-otp, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: ""}] }, output={ "errors": [ { "errorCode": "invalid_otp_channel", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendBindingOtp/SendBindingOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Send binding Otp VID with empty OtpChannels, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:97)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_SendBindingOtp_Vid_Future_RequestTime_Neg, endPoint=/v1/esignet/binding/binding-otp, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "2033-11-07T06:51:30.195Z", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendBindingOtp/SendBindingOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Send binding Otp VID with future requestTime, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:97)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_SendBindingOtp_Vid_Invalid_Case_IndividualId_Neg, endPoint=/v1/esignet/binding/binding-otp, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "@#$#$##", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "IDA-MLC-009", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendBindingOtp/SendBindingOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Send binding Otp VID with invalid case in individualId, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:97)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_SendBindingOtp_Vid_Invalid_OtpChannels_Neg, endPoint=/v1/esignet/binding/binding-otp, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "emaeill"},{channel: "moebileee"}] }, output={ "errors": [ { "errorCode": "invalid_otp_channel", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendBindingOtp/SendBindingOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Send binding Otp VID with invalid OtpChannels, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:97)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_SendBindingOtp_Vid_Invalid_RequestTime_Neg, endPoint=/v1/esignet/binding/binding-otp, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "2022-11-08T06:35:53", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendBindingOtp/SendBindingOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Send binding Otp VID with invalid requestTime, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:97)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_SendBindingOtp_Vid_Missing_IndividualId_Neg, endPoint=/v1/esignet/binding/binding-otp, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$REMOVE$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "invalid_identifier", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendBindingOtp/SendBindingOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Send binding Otp VID without individualId, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:97)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_SendBindingOtp_Vid_Missing_OtpChannels_Neg, endPoint=/v1/esignet/binding/binding-otp, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": "$REMOVE$" }, output={ "errors": [ { "errorCode": "invalid_otp_channel", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendBindingOtp/SendBindingOtpEmptyOtpChannel, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Send binding Otp VID without OtpChannels, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:97)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_SendBindingOtp_Vid_Missing_RequestTime_Neg, endPoint=/v1/esignet/binding/binding-otp, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$REMOVE$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendBindingOtp/SendBindingOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Send binding Otp VID without requestTime, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:97)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_SendBindingOtp_Vid_Past_RequestTime_Neg, endPoint=/v1/esignet/binding/binding-otp, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "2022-11-07T06:51:30.195Z", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendBindingOtp/SendBindingOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Send binding Otp VID with past requestTime, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:97)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_SendBindingOtp_Vid_Space_As_RequestTime_Neg, endPoint=/v1/esignet/binding/binding-otp, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": " ", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendBindingOtp/SendBindingOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Send binding Otp VID with only space in requestTime, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:97)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_SendBindingOtp_Vid_Space_Sep_OtpChannels_Neg, endPoint=/v1/esignet/binding/binding-otp, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "em ail"},{channel: "mobi le"}] }, output={ "errors": [ { "errorCode": "invalid_otp_channel", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendBindingOtp/SendBindingOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Send binding Otp VID with space separated OtpChannels, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:97)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_SendBindingOtp_Vid_Valid_Smoke_sid, endPoint=/v1/esignet/binding/binding-otp, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "maskedEmail": "$IGNORE$", "maskedMobile": "$IGNORE$" }, inputTemplate=esignet/SendBindingOtp/SendBindingOtp, outputTemplate=esignet/SendBindingOtp/SendBindingOtpResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Send binding Otp for VID with valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:97)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_SendBindingOtp_Vid_invalid_individual_id_Neg, endPoint=/v1/esignet/binding/binding-otp, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "168461341611351", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "IDA-MLC-009", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendBindingOtp/SendBindingOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Send binding Otp VID with invalid individualId, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:97)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_SendBindingOtp_uin_Email_Valid_Smoke_sid, endPoint=/v1/esignet/binding/binding-otp, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_WOPhone_smoke_Pos_UIN$", "otpChannels": [{channel: "email"}] }, output={ "maskedEmail": "$IGNORE$", "maskedMobile": "$IGNORE$" }, inputTemplate=esignet/SendBindingOtp/SendBindingOtp, outputTemplate=esignet/SendBindingOtp/SendBindingOtpResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Send binding Otp to email for UIN with valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:259)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:86)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_SendBindingOtp_uin_Empty_IndividualId_Neg, endPoint=/v1/esignet/binding/binding-otp, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "invalid_identifier", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendBindingOtp/SendBindingOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Send binding Otp UIN with empty individualId, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_SendBindingOtp_uin_Empty_OtpChannels_Neg, endPoint=/v1/esignet/binding/binding-otp, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: ""}] }, output={ "errors": [ { "errorCode": "invalid_otp_channel", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendBindingOtp/SendBindingOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Send binding Otp UIN with empty OtpChannels, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_SendBindingOtp_uin_Future_RequestTime_Neg, endPoint=/v1/esignet/binding/binding-otp, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "2033-11-07T06:51:30.195Z", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendBindingOtp/SendBindingOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Send binding Otp for UIN with future requestTime, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_SendBindingOtp_uin_Invalid_Case_IndividualId_Neg, endPoint=/v1/esignet/binding/binding-otp, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "@#$#$##", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "IDA-MLC-009", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendBindingOtp/SendBindingOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=IDA-MLC-009,invalid_individual_id, kycFields=null, description=Send binding Otp for UIN with invalid case in individualId, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_SendBindingOtp_uin_Invalid_OtpChannels_Neg, endPoint=/v1/esignet/binding/binding-otp, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "emaeill"},{channel: "moebileee"}] }, output={ "errors": [ { "errorCode": "invalid_otp_channel", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendBindingOtp/SendBindingOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Send binding Otp UIN with invalid OtpChannels, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_SendBindingOtp_uin_Invalid_RequestTime_Neg, endPoint=/v1/esignet/binding/binding-otp, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "2022-11-08T06:35:53", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendBindingOtp/SendBindingOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Send binding Otp for UIN with invalid requestTime, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_SendBindingOtp_uin_Missing_IndividualId_Neg, endPoint=/v1/esignet/binding/binding-otp, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$REMOVE$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "invalid_identifier", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendBindingOtp/SendBindingOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Send binding Otp UIN without individualId, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_SendBindingOtp_uin_Missing_OtpChannels_Neg, endPoint=/v1/esignet/binding/binding-otp, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": "$REMOVE$" }, output={ "errors": [ { "errorCode": "invalid_otp_channel", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendBindingOtp/SendBindingOtpEmptyOtpChannel, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Send binding Otp UIN without OtpChannels, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_SendBindingOtp_uin_Missing_RequestTime_Neg, endPoint=/v1/esignet/binding/binding-otp, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$REMOVE$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendBindingOtp/SendBindingOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Send binding Otp for UIN without requestTime, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_SendBindingOtp_uin_NR_Email_IndividualId_Neg, endPoint=/v1/esignet/binding/binding-otp, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_WOEmail_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "maskedEmail": "$IGNORE$", "maskedMobile": "$IGNORE$" }, inputTemplate=esignet/SendBindingOtp/SendBindingOtp, outputTemplate=esignet/SendBindingOtp/SendBindingOtpResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Send binding Otp for UIN NR email for individualId, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_SendBindingOtp_uin_NR_Phone_IndividualId_Neg, endPoint=/v1/esignet/binding/binding-otp, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_WOPhone_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "maskedEmail": "$IGNORE$", "maskedMobile": "$IGNORE$" }, inputTemplate=esignet/SendBindingOtp/SendBindingOtp, outputTemplate=esignet/SendBindingOtp/SendBindingOtpResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Send binding Otp UIN NR phone for individualId, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_SendBindingOtp_uin_Past_RequestTime_Neg, endPoint=/v1/esignet/binding/binding-otp, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "2022-11-07T06:51:30.195Z", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendBindingOtp/SendBindingOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Send binding Otp for UIN with past requestTime, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_SendBindingOtp_uin_Phone_Valid_Smoke_sid, endPoint=/v1/esignet/binding/binding-otp, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_WOEmail_smoke_Pos_UIN$", "otpChannels": [{channel: "phone"}] }, output={ "maskedEmail": "$IGNORE$", "maskedMobile": "$IGNORE$" }, inputTemplate=esignet/SendBindingOtp/SendBindingOtp, outputTemplate=esignet/SendBindingOtp/SendBindingOtpResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Send binding Otp to phone for UIN with valid details, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_SendBindingOtp_uin_Space_As_RequestTime_Neg, endPoint=/v1/esignet/binding/binding-otp, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": " ", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendBindingOtp/SendBindingOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Send binding Otp for UIN with space in requestTime, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_SendBindingOtp_uin_Space_Sep_OtpChannels_Neg, endPoint=/v1/esignet/binding/binding-otp, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "em ail"},{channel: "mobi le"}] }, output={ "errors": [ { "errorCode": "invalid_otp_channel", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendBindingOtp/SendBindingOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Send binding Otp UIN with space separated OtpChannels, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_SendBindingOtp_uin_all_Valid_Smoke_sid, endPoint=/v1/esignet/binding/binding-otp, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "maskedEmail": "$IGNORE$", "maskedMobile": "$IGNORE$" }, inputTemplate=esignet/SendBindingOtp/SendBindingOtp, outputTemplate=esignet/SendBindingOtp/SendBindingOtpResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Send binding Otp for UIN with all valid details, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_SendBindingOtp_uin_invalid_individual_id_Neg, endPoint=/v1/esignet/binding/binding-otp, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "168461341611351", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "IDA-MLC-009", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendBindingOtp/SendBindingOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=IDA-MLC-009,invalid_individual_id, kycFields=null, description=Send binding Otp for UIN with invalid individualId, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_Vid_EmptyVal_AuthFactorType_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "authFactorType": "", "challenge": "$ID:AddIdentity_Vid_Generation_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type", "errorMessage": "request.challengeList[0].authFactorType: invalid_auth_factor_type" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=invalid_auth_factor_type, kycFields=null, description=Wallet binding VID with empty value in AuthFactorType, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:92)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_Vid_EmptyVal_Challenge_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "authFactorType": "OTP", "challenge": "", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge", "errorMessage": "request.challengeList[0].challenge: invalid_challenge" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=invalid_challenge, kycFields=null, description=Wallet binding VID with empty value in challenge, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:92)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_Vid_Empty_Formate_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Vid_Generation_smoke_Pos_EMAIL$", "format": "", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=invalid_challenge_format, kycFields=null, description=Wallet binding VID with empty format, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:92)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_Vid_Empty_IndividualId_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Vid_Generation_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_individual_id", "errorMessage": "request.individualId: invalid_individual_id" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Wallet binding VID with empty individualId, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:92)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_Vid_Empty_authFactorType1_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Vid_Generation_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type", "errorMessage": "request.authFactorType: invalid_auth_factor_type" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Wallet binding VID with empty authFactorType1, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:92)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_Vid_Empty_format1_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Vid_Generation_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge_format", "errorMessage": "request.format: unsupported_challenge_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Wallet binding VID with empty format1, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:92)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_Vid_Future_RequestTime_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "2033-11-07T06:51:30.195Z", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Vid_Generation_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "requestTime: invalid_request" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Wallet binding VID with future requestTime, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:92)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_Vid_Invalid_AuthFactorType_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "authFactorType": "dfg5", "challenge": "$ID:AddIdentity_Vid_Generation_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Wallet binding VID with invalid authFactorType, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:92)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_Vid_Invalid_Challenge_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "authFactorType": "OTP", "challenge": "gd5$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Wallet binding VID with invalid challenge, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:92)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_Vid_Invalid_Formate_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Vid_Generation_smoke_Pos_EMAIL$", "format": "GT$r5", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Wallet binding VID with invalid format, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:92)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_Vid_Invalid_IndividualId_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$tyhg", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Vid_Generation_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "IDA-MLC-009", "errorMessage": "$IGNORE$" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=binding_auth_failed,IDA-MLC-009, kycFields=null, description=Wallet binding VID with invalid individualId, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:92)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_Vid_Invalid_RequestTime_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "asdf$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Vid_Generation_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "requestTime: invalid_request" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Wallet binding VID with invalid requestTime, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:92)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_Vid_Invalid_authFactorType1_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Vid_Generation_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "hy$5", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type_or_challenge_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Wallet binding VID with invalid authFactorType1, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:92)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_Vid_Invalid_format1_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Vid_Generation_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "hju$5", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type_or_challenge_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Wallet binding VID with invalid format1, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:92)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_Vid_Invalid_publicKey_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Vid_Generation_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "ghj$4", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "unknown_error", "errorMessage": "JSON parse error: Cannot construct instance of `java.util.LinkedHashMap` (although at least one Creator exists): no String-argument constructor/factory method to deserialize from String value (\u0027ghj$4\u0027); nested exception is com.fasterxml.jackson.databind.exc.MismatchedInputException: Cannot construct instance of `java.util.LinkedHashMap` (although at least one Creator exists): no String-argument constructor/factory method to deserialize from String value (\u0027ghj$4\u0027)\n at [Source: (PushbackInputStream); line: 1, column: 221] (through reference chain: io.mosip.idp.core.dto.RequestWrapper[\"request\"]-\u003eio.mosip.idp.core.dto.WalletBindingRequest[\"publicKey\"])" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Wallet binding VID with invalid publicKey, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:92)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_Vid_Missing_AuthFactorType_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "authFactorType": "$REMOVE$", "challenge": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=invalid_auth_factor_type, kycFields=null, description=Wallet binding VID without AuthFactorType, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:92)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_Vid_Missing_Challenge_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "authFactorType": "OTP", "challenge": "$REMOVE$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge", "errorMessage": "request.challengeList[0].challenge: invalid_challenge" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=invalid_challenge, kycFields=null, description=Wallet binding VID without challenge, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:92)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_Vid_Missing_Formate_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Vid_Generation_smoke_Pos_EMAIL$", "format": "$REMOVE$", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge_format", "errorMessage": "request.format: unsupported_challenge_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=invalid_challenge_format, kycFields=null, description=Wallet binding VID without format, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:92)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_Vid_Missing_IndividualId_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$REMOVE$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Vid_Generation_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_individual_id", "errorMessage": "request.individualId: invalid_individual_id" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Wallet binding VID without individualId, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:92)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_Vid_Missing_authFactorType1_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Vid_Generation_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "$REMOVE$", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type", "errorMessage": "request.authFactorType: invalid_auth_factor_type" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Wallet binding VID without authFactorType1, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:92)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_Vid_Missing_format1_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Vid_Generation_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "$REMOVE$", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge_format", "errorMessage": "request.format: unsupported_challenge_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Wallet binding VID without format1, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:92)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_Vid_Null_IndividualId_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "null", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Vid_Generation_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "IDA-MLC-009", "errorMessage": "$IGNORE$" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=binding_auth_failed,IDA-MLC-009, kycFields=null, description=Wallet binding VID with Null in individualId, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:92)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_Vid_Null_publicKey_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Vid_Generation_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "null", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_public_key", "errorMessage": "request.publicKey: invalid_public_key" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Wallet binding VID with Null in publicKey, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:92)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_Vid_OTP_Valid_Smoke, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Vid_Generation_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/WalletBinding/WalletBindingResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Wallet binding VID with valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:92)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_Vid_PastVal_RequestTime_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "2033-11-07T06:51:30.195Z", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Vid_Generation_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "requestTime: invalid_request" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Wallet binding VID with past value in requestTime, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:92)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_Vid_SpaceVal_AuthFactorType_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "authFactorType": " ", "challenge": "$ID:AddIdentity_Vid_Generation_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type", "errorMessage": "request.challengeList[0].authFactorType: invalid_auth_factor_type" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=invalid_auth_factor_type,invalid_auth_factor_type_format,invalid_challenge_length, kycFields=null, description=Wallet binding VID with space in AuthFactorType, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:92)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_Vid_SpaceVal_Challenge_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "authFactorType": "OTP", "challenge": " ", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge", "errorMessage": "request.challengeList[0].challenge: invalid_challenge" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=invalid_challenge, kycFields=null, description=Wallet binding VID with space in challenge, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:92)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_Vid_SpaceVal_Formate_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Vid_Generation_smoke_Pos_EMAIL$", "format": " ", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge_format", "errorMessage": "request.challengeList[0].format: unsupported_challenge_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=invalid_challenge_format, kycFields=null, description=Wallet binding VID with space in format, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:92)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_Vid_SpaceVal_IndividualId_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": " ", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Vid_Generation_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_individual_id" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Wallet binding VID with space in individualId, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:92)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_Vid_SpaceVal_authFactorType1_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Vid_Generation_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": " ", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type_or_challenge_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Wallet binding VID with space in authFactorType1, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:92)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_Vid_SpaceVal_format1_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Vid_Generation_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": " ", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type_or_challenge_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Wallet binding VID with space in format1, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:92)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_uin_EmptyVal_AuthFactorType_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "authFactorType": "", "challenge": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=invalid_auth_factor_type, kycFields=null, description=Wallet binding UIN with empty value in AuthFactorType, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_uin_EmptyVal_Challenge_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge", "errorMessage": "request.challengeList[0].challenge: invalid_challenge" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=invalid_challenge, kycFields=null, description=Wallet binding UIN with empty value in challenge, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_uin_Empty_Formate_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_EMAIL$", "format": "", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=invalid_challenge_format, kycFields=null, description=Wallet binding UIN with empty format, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_uin_Empty_IndividualId_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_individual_id", "errorMessage": "request.individualId: invalid_individual_id" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Wallet binding UIN with empty individualId, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_uin_Empty_authFactorType1_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type", "errorMessage": "request.authFactorType: invalid_auth_factor_type" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Wallet binding UIN with empty authFactorType1, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_uin_Empty_format1_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge_format", "errorMessage": "request.format: unsupported_challenge_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Wallet binding UIN with empty format1, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_uin_Future_RequestTime_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "2033-11-07T06:51:30.195Z", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "requestTime: invalid_request" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Wallet binding UIN with future requestTime, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_uin_Invalid_AuthFactorType_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "authFactorType": "dfg5", "challenge": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Wallet binding UIN with invalid AuthFactorType, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_uin_Invalid_Challenge_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "gd5$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Wallet binding UIN with invalid challenge, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_uin_Invalid_Formate_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_EMAIL$", "format": "GT$r5", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Wallet binding UIN with invalid format, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_uin_Invalid_IndividualId_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$tyhg", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "IDA-MLC-009", "errorMessage": "$IGNORE$" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=binding_auth_failed,invalid_individual_id,IDA-MLC-009, kycFields=null, description=Wallet binding UIN with invalid individualId, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_uin_Invalid_RequestTime_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "asdf$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "requestTime: invalid_request" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Wallet binding UIN with invalid requestTime, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_uin_Invalid_authFactorType1_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "hy$5", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type_or_challenge_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Wallet binding UIN with invalid authFactorType1, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_uin_Invalid_format1_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "hju$5", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type_or_challenge_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Wallet binding UIN with invalid format1, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_uin_Invalid_publicKey_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "ghj$4", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "unknown_error", "errorMessage": "JSON parse error: Cannot construct instance of `java.util.LinkedHashMap` (although at least one Creator exists): no String-argument constructor/factory method to deserialize from String value (\u0027ghj$4\u0027); nested exception is com.fasterxml.jackson.databind.exc.MismatchedInputException: Cannot construct instance of `java.util.LinkedHashMap` (although at least one Creator exists): no String-argument constructor/factory method to deserialize from String value (\u0027ghj$4\u0027)\n at [Source: (PushbackInputStream); line: 1, column: 221] (through reference chain: io.mosip.idp.core.dto.RequestWrapper[\"request\"]-\u003eio.mosip.idp.core.dto.WalletBindingRequest[\"publicKey\"])" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Wallet binding UIN with invalid publicKey, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_uin_Missing_AuthFactorType_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "authFactorType": "$REMOVE$", "challenge": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=invalid_auth_factor_type, kycFields=null, description=Wallet binding UIN with missing AuthFactorType, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_uin_Missing_Challenge_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$REMOVE$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge", "errorMessage": "request.challengeList[0].challenge: invalid_challenge" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=invalid_challenge, kycFields=null, description=Wallet binding UIN with missing challenge, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_uin_Missing_Formate_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_EMAIL$", "format": "$REMOVE$", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=invalid_challenge_format, kycFields=null, description=Wallet binding UIN with missing format, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_uin_Missing_IndividualId_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$REMOVE$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_individual_id", "errorMessage": "request.individualId: invalid_individual_id" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Wallet binding UIN without individualId, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_uin_Missing_authFactorType1_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "$REMOVE$", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type", "errorMessage": "request.authFactorType: invalid_auth_factor_type" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Wallet binding UIN with missing authFactorType1, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_uin_Missing_format1_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "$REMOVE$", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge_format", "errorMessage": "request.format: unsupported_challenge_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Wallet binding UIN without format1, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_uin_Null_IndividualId_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "null", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "IDA-MLC-009", "errorMessage": "$IGNORE$" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=binding_auth_failed,invalid_individual_id,IDA-MLC-009, kycFields=null, description=Wallet binding UIN with Null in individualId, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_uin_Null_publicKey_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "null", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_public_key", "errorMessage": "request.publicKey: invalid_public_key" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Wallet binding UIN with Null in publicKey, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_uin_OTP_Email_Valid_Smoke, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_WOPhone_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Valid_Params_WOPhone_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_WOPhone_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/WalletBinding/WalletBindingResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Wallet binding UIN with Otp email, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_uin_OTP_Phone_Valid_Smoke, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_WOEmail_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Valid_Params_WOEmail_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_WOEmail_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/WalletBinding/WalletBindingResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Wallet binding UIN with Otp phone, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_uin_OTP_Valid_Smoke, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/WalletBinding/WalletBindingResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Wallet binding UIN with valid details, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_uin_PastVal_RequestTime_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "2033-11-07T06:51:30.195Z", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "requestTime: invalid_request" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Wallet binding UIN with past value in requestTime, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_uin_SpaceVal_AuthFactorType_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "authFactorType": " ", "challenge": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type", "errorMessage": "request.challengeList[0].authFactorType: invalid_auth_factor_type" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=invalid_auth_factor_type, kycFields=null, description=Wallet binding UIN with space in AuthFactorType, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_uin_SpaceVal_Challenge_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": " ", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge", "errorMessage": "request.challengeList[0].challenge: invalid_challenge" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=invalid_challenge, kycFields=null, description=Wallet binding UIN with space in challenge, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_uin_SpaceVal_Formate_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_EMAIL$", "format": " ", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge_format", "errorMessage": "request.challengeList[0].format: unsupported_challenge_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=invalid_challenge_format, kycFields=null, description=Wallet binding UIN with space in format, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_uin_SpaceVal_IndividualId_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": " ", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_individual_id" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Wallet binding UIN with space in individualId, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_uin_SpaceVal_authFactorType1_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": " ", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type_or_challenge_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Wallet binding UIN with space in authFactorType1, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_uin_SpaceVal_format1_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": " ", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type_or_challenge_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Wallet binding UIN with space in format1, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_LinkAuth_Consent_EmptyClaim_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:linked-wallet", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestNullClaims, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with linkAuth consent and empty claim, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_LinkAuth_Consent_NoClaim_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:linked-wallet", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ "errors": [ { "errorCode": "invalid_claim", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestNoClaims, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with linkAuth consent and no claims, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_LinkAuth_Consent_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:linked-wallet", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with linkAuth consent valid details, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_LinkAuth_Consent_vid_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:linked-wallet", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with linkAuth consent valid details, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateLinkCode_Consent_Vid_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/link-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Consent_vid_Valid_Smoke_sid_transactionId$" }, output={ }, inputTemplate=esignet/GenerateLinkCode/GenerateLinkCode, outputTemplate=esignet/GenerateLinkCode/GenerateLinkCodeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Generate LinkCode consent VID with all valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:99)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateLinkCode_Consent_uin_EmptyClaim_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/link-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Consent_EmptyClaim_Valid_Smoke_sid_transactionId$" }, output={ }, inputTemplate=esignet/GenerateLinkCode/GenerateLinkCode, outputTemplate=esignet/GenerateLinkCode/GenerateLinkCodeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Generate LinkCode consent UIN with empty claim all valid details, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateLinkCode_Consent_uin_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/link-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Consent_Valid_Smoke_sid_transactionId$" }, output={ }, inputTemplate=esignet/GenerateLinkCode/GenerateLinkCode, outputTemplate=esignet/GenerateLinkCode/GenerateLinkCodeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Generate LinkCode consent UIN with all valid details, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkTransaction_Consent_Vid_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/link-transaction, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkCode": "$ID:GenerateLinkCode_Consent_Vid_all_Valid_Smoke_sid_linkCode$" }, output={ }, inputTemplate=esignet/LinkTransaction/LinkTransaction, outputTemplate=esignet/LinkTransaction/LinkTransactionResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Link transaction consent VID with all valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:99)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkTransaction_Consent_uin_EmptyClaim_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/link-transaction, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkCode": "$ID:GenerateLinkCode_Consent_uin_EmptyClaim_all_Valid_Smoke_sid_linkCode$" }, output={ }, inputTemplate=esignet/LinkTransaction/LinkTransaction, outputTemplate=esignet/LinkTransaction/LinkTransactionResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Link transaction consent UIN with empty claim, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkTransaction_Consent_uin_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/link-transaction, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkCode": "$ID:GenerateLinkCode_Consent_uin_all_Valid_Smoke_sid_linkCode$" }, output={ }, inputTemplate=esignet/LinkTransaction/LinkTransaction, outputTemplate=esignet/LinkTransaction/LinkTransactionResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Link transaction consent UIN with all valid details, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetLinkStatus_Consent_Vid_all_Valid_Smoke, endPoint=/v1/esignet/linked-authorization/link-status, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Consent_vid_Valid_Smoke_sid_transactionId$", "linkCode": "$ID:GenerateLinkCode_Consent_Vid_all_Valid_Smoke_sid_linkCode$" }, output={ }, inputTemplate=esignet/GetLinkStatus/GetLinkStatus, outputTemplate=esignet/GetLinkStatus/GetLinkStatusResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Get link status consent VID with all valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:97)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_GetLinkStatus_Consent_uin_EmptyClaim_all_Valid_Smoke, endPoint=/v1/esignet/linked-authorization/link-status, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Consent_EmptyClaim_Valid_Smoke_sid_transactionId$", "linkCode": "$ID:GenerateLinkCode_Consent_uin_EmptyClaim_all_Valid_Smoke_sid_linkCode$" }, output={ }, inputTemplate=esignet/GetLinkStatus/GetLinkStatus, outputTemplate=esignet/GetLinkStatus/GetLinkStatusResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Get link status consent UIN with empty claim, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetLinkStatus_Consent_uin_all_Valid_Smoke, endPoint=/v1/esignet/linked-authorization/link-status, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Consent_Valid_Smoke_sid_transactionId$", "linkCode": "$ID:GenerateLinkCode_Consent_uin_all_Valid_Smoke_sid_linkCode$" }, output={ }, inputTemplate=esignet/GetLinkStatus/GetLinkStatus, outputTemplate=esignet/GetLinkStatus/GetLinkStatusResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Get link status consent UIN with all valid details, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkedAuthenticationWla_ConsentVid_SCert_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/v2/authenticate, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkTransactionId": "$ID:LinkTransaction_Consent_Vid_all_Valid_Smoke_sid_linkTransactionId$", "individualId": "$ID:Generate_Perpetual_VID_Linked_Consent_Valid_Smoke_sid_vid$", "authFactorType": "WLA", "challenge": "$WLATOKENCONSENTVID$", "format": "jwt", "sendOtp":{ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Linked_Consent_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp", }, "validateOtp":{ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Linked_Consent_Valid_Smoke_sid_vid$", "authFactorType1": "WLA", "format1": "jwt", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Linked_Consent_Vid_smoke_Pos_EMAIL$", "format": "alpha-numeric", "publicKey": "$BINDINGCONSENTJWKKEYVID$", "validateOtpReqTemplate": "esignet/WalletBinding/WalletBinding", "validateOtpEndPoint": "/v1/esignet/binding/wallet-binding" } }, output={ "consentAction": "CAPTURE", "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" }, "validateOtpResp":{ "sendOtpResTemplate":"esignet/WalletBinding/WalletBindingResult" } }, inputTemplate=esignet/LinkedAuthenticationWla/LinkedAuthenticationWla, outputTemplate=esignet/LinkedConsent/LinkedAuthenticationConsentWla/LinkedAuthenticationConsentWlaResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=LinkedAuthenticationWla consent VID SCert with all valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerateForWla.test(PostWithAutogenIdWithOtpGenerateForWla.java:92)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkedAuthenticationWla_Consent_EmptyClaim_uin_SCert_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/v2/authenticate, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkTransactionId": "$ID:LinkTransaction_Consent_uin_EmptyClaim_all_Valid_Smoke_sid_linkTransactionId$", "individualId": "$ID:AddIdentity_Linked_Consent_smoke_Pos_UIN$", "authFactorType": "WLA", "challenge": "$WLATOKENCONSENTEMPTYCLAIM$", "format": "jwt", "sendOtp":{ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Linked_Consent_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp", }, "validateOtp":{ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Linked_Consent_smoke_Pos_UIN$", "authFactorType1": "WLA", "format1": "jwt", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Linked_Consent_smoke_Pos_EMAIL$", "format": "alpha-numeric", "publicKey": "$BINDINGCONSENTEMPTYCLAIMJWKKEY$", "validateOtpReqTemplate": "esignet/WalletBinding/WalletBinding", "validateOtpEndPoint": "/v1/esignet/binding/wallet-binding" } }, output={ "consentAction": "CAPTURE", "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" }, "validateOtpResp":{ "sendOtpResTemplate":"esignet/WalletBinding/WalletBindingResult" } }, inputTemplate=esignet/LinkedAuthenticationWla/LinkedAuthenticationWla, outputTemplate=esignet/LinkedConsent/LinkedAuthenticationConsentWla/LinkedAuthenticationConsentWlaResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=LinkedAuthenticationWla consent UIN with empty claim, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkedAuthenticationWla_Consentuin_SCert_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/v2/authenticate, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkTransactionId": "$ID:LinkTransaction_Consent_uin_all_Valid_Smoke_sid_linkTransactionId$", "individualId": "$ID:AddIdentity_Linked_Consent_smoke_Pos_UIN$", "authFactorType": "WLA", "challenge": "$WLATOKENCONSENT$", "format": "jwt", "sendOtp":{ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Linked_Consent_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp", }, "validateOtp":{ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Linked_Consent_smoke_Pos_UIN$", "authFactorType1": "WLA", "format1": "jwt", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Linked_Consent_smoke_Pos_EMAIL$", "format": "alpha-numeric", "publicKey": "$BINDINGCONSENTJWKKEY$", "validateOtpReqTemplate": "esignet/WalletBinding/WalletBinding", "validateOtpEndPoint": "/v1/esignet/binding/wallet-binding" } }, output={ "consentAction": "CAPTURE", "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" }, "validateOtpResp":{ "sendOtpResTemplate":"esignet/WalletBinding/WalletBindingResult" } }, inputTemplate=esignet/LinkedAuthenticationWla/LinkedAuthenticationWla, outputTemplate=esignet/LinkedConsent/LinkedAuthenticationConsentWla/LinkedAuthenticationConsentWlaResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=LinkedAuthenticationWla consent UIN SCert with all valid details, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkedAuthorizationConsent_Consent_Vid_All_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/v2/consent, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkedTransactionId": "$ID:LinkTransaction_Consent_Vid_all_Valid_Smoke_sid_linkTransactionId$", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}], "signature": "$CONSENTDETACHEDSIGNATUREVID$" }, output={ }, inputTemplate=esignet/LinkedConsent/LinkAuthorizationConsent/LinkAuthorizationConsent, outputTemplate=esignet/LinkedAuthorizationConsent/LinkedAuthorizationConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Linked Authorization conset VID with all valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:97)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkedAuthorizationConsent_Consent_uin_All_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/v2/consent, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkedTransactionId": "$ID:LinkTransaction_Consent_uin_all_Valid_Smoke_sid_linkTransactionId$", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}], "signature": "$CONSENTDETACHEDSIGNATURE$" }, output={ }, inputTemplate=esignet/LinkedConsent/LinkAuthorizationConsent/LinkAuthorizationConsent, outputTemplate=esignet/LinkedAuthorizationConsent/LinkedAuthorizationConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Linked Authorization conset UIN with all valid details, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkAuthorizationCode_Consent_Vid_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/link-auth-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Consent_vid_Valid_Smoke_sid_transactionId$", "linkedCode": "$ID:GenerateLinkCode_Consent_Vid_all_Valid_Smoke_sid_linkCode$" }, output={ }, inputTemplate=esignet/LinkAuthorizationCode/LinkAuthorizationCode, outputTemplate=esignet/LinkAuthorizationCode/LinkAuthorizationCodeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Link Authorization code consent VID with all valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:99)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkAuthorizationCode_Consent_uin_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/link-auth-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Consent_Valid_Smoke_sid_transactionId$", "linkedCode": "$ID:GenerateLinkCode_Consent_uin_all_Valid_Smoke_sid_linkCode$" }, output={ }, inputTemplate=esignet/LinkAuthorizationCode/LinkAuthorizationCode, outputTemplate=esignet/LinkAuthorizationCode/LinkAuthorizationCodeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Link Authorization code consent UIN with all valid details, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_LinkedConsent_Vid_Valid_Smoke_sid, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:LinkAuthorizationCode_Consent_Vid_all_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "token_type": "Bearer" }, inputTemplate=esignet/Consent/GenerateTokenConsent/GenerateTokenConsent, outputTemplate=esignet/Consent/GenerateTokenConsent/GenerateTokenConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate Token linkedConsent VID with all valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:101)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_LinkedConsent_uin_Valid_Smoke_sid, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:LinkAuthorizationCode_Consent_uin_all_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "token_type": "Bearer" }, inputTemplate=esignet/Consent/GenerateTokenConsent/GenerateTokenConsent, outputTemplate=esignet/Consent/GenerateTokenConsent/GenerateTokenConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate Token linkedConsent UIN with all valid details, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetOidcUserInfo_LinkedConsent_Vid_IdpAccessToken_StatusCode_Valid_Smoke_sid, endPoint=/v1/esignet/oidc/userinfo, role=resident, templateFields=null, input={ "idpAccessToken": "$ID:GenerateToken_LinkedConsent_Vid_Valid_Smoke_sid_access_token$" }, output=200, inputTemplate=esignet/Consent/GetOidcUserInfoConsent/GetOidcUserInfoConsent, outputTemplate=esignet/Consent/GetOidcUserInfoConsent/GetOidcUserInfoConsentResult, restMethod=get, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get OIDC user info for linked consent VID with all valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.GetWithParam.test(GetWithParam.java:95)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_GetOidcUserInfo_LinkedConsent_uin_IdpAccessToken_StatusCode_Valid_Smoke_sid, endPoint=/v1/esignet/oidc/userinfo, role=resident, templateFields=null, input={ "idpAccessToken": "$ID:GenerateToken_LinkedConsent_uin_Valid_Smoke_sid_access_token$" }, output=200, inputTemplate=esignet/Consent/GetOidcUserInfoConsent/GetOidcUserInfoConsent, outputTemplate=esignet/Consent/GetOidcUserInfoConsent/GetOidcUserInfoConsentResult, restMethod=get, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get OIDC user info for linked consent UIN with all valid details, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_LinkAuth_Consent_SameClaim_Vid_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:linked-wallet", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request linkAuth consent with same claim details VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:99)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_LinkAuth_Consent_User2_Vid_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_Misp_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:linked-wallet", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request linkAuth consent User2 VID with valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:99)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_LinkAuth_Vid_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:linked-wallet", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request linkAuth VID with all valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:99)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_LinkAuth_Consent_SameClaim_Uin_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:linked-wallet", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request linkAuth consent with same claim details UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_LinkAuth_Consent_User2_Uin_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_Misp_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:linked-wallet", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request linkAuth consent User2 UIN with valid details, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_LinkAuth_Other_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request other linkAuth with valid details, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_LinkAuth_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:linked-wallet", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request linkAuth with all valid details, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateLinkCode_Consent_Vid_SameClaim_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/link-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Consent_SameClaim_Vid_Valid_Smoke_sid_transactionId$" }, output={ }, inputTemplate=esignet/GenerateLinkCode/GenerateLinkCode, outputTemplate=esignet/GenerateLinkCode/GenerateLinkCodeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Generate link code consent VID with same claim details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:99)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateLinkCode_Consent_Vid_User2_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/link-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Consent_User2_Vid_Valid_Smoke_sid_transactionId$" }, output={ }, inputTemplate=esignet/GenerateLinkCode/GenerateLinkCode, outputTemplate=esignet/GenerateLinkCode/GenerateLinkCodeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Generate link code consent VID user2 with all valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:99)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateLinkCode_Vid_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/link-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Vid_Valid_Smoke_sid_transactionId$" }, output={ }, inputTemplate=esignet/GenerateLinkCode/GenerateLinkCode, outputTemplate=esignet/GenerateLinkCode/GenerateLinkCodeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Generate link code with all valid details VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:99)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateLinkCode_Consent_uin_SameClaim_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/link-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Consent_SameClaim_Uin_Valid_Smoke_sid_transactionId$" }, output={ }, inputTemplate=esignet/GenerateLinkCode/GenerateLinkCode, outputTemplate=esignet/GenerateLinkCode/GenerateLinkCodeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Generate link code consent UIN with same claim details, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateLinkCode_Consent_uin_User2_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/link-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Consent_User2_Uin_Valid_Smoke_sid_transactionId$" }, output={ }, inputTemplate=esignet/GenerateLinkCode/GenerateLinkCode, outputTemplate=esignet/GenerateLinkCode/GenerateLinkCodeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Generate link code consent UIN user2 with all valid details, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateLinkCode_Empty_transactionId_Neg, endPoint=/v1/esignet/linked-authorization/link-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "" }, output={ "errors": [ { "errorCode": "invalid_transaction_id", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/GenerateLinkCode/GenerateLinkCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Generate link code with empty transactionId, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateLinkCode_Expired_transactionId_Neg, endPoint=/v1/esignet/linked-authorization/link-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "4eKDB4GPk6fP8XXEDY7rktwtQF6WiwrOCehT2CwyVT0" }, output={ "errors": [ { "errorCode": "invalid_transaction", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/GenerateLinkCode/GenerateLinkCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Generate link code with expired transactionId, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateLinkCode_Future_RequestTime_Neg, endPoint=/v1/esignet/linked-authorization/link-code, role=resident, templateFields=null, input={ "requestTime": "2033-11-07T06:51:30.195Z", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Other_Valid_Smoke_sid_transactionId$" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/GenerateLinkCode/GenerateLinkCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Generate link code with future requestTime, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateLinkCode_Invalid_RequestTime_Neg, endPoint=/v1/esignet/linked-authorization/link-code, role=resident, templateFields=null, input={ "requestTime": "2022-11-08T06:35:53", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Other_Valid_Smoke_sid_transactionId$" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/GenerateLinkCode/GenerateLinkCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Generate link code with invalid requestTime, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateLinkCode_Invalid_transactionId_Neg, endPoint=/v1/esignet/linked-authorization/link-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "transactionId" }, output={ "errors": [ { "errorCode": "invalid_transaction", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/GenerateLinkCode/GenerateLinkCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Generate link code with invalid transactionId, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateLinkCode_Missing_RequestTime_Neg, endPoint=/v1/esignet/linked-authorization/link-code, role=resident, templateFields=null, input={ "requestTime": "$REMOVE$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Other_Valid_Smoke_sid_transactionId$" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/GenerateLinkCode/GenerateLinkCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Generate link code without requestTime, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateLinkCode_Missing_transactionId_Neg, endPoint=/v1/esignet/linked-authorization/link-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$REMOVE$" }, output={ "errors": [ { "errorCode": "invalid_transaction_id", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/GenerateLinkCode/GenerateLinkCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Generate link code without transactionId, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateLinkCode_Null_transactionId_Neg, endPoint=/v1/esignet/linked-authorization/link-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "null" }, output={ "errors": [ { "errorCode": "invalid_transaction", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/GenerateLinkCode/GenerateLinkCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Generate link code with Null in transactionId, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateLinkCode_Past_RequestTime_Neg, endPoint=/v1/esignet/linked-authorization/link-code, role=resident, templateFields=null, input={ "requestTime": "2022-11-07T06:51:30.195Z", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Other_Valid_Smoke_sid_transactionId$" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/GenerateLinkCode/GenerateLinkCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Generate link code with past requestTime, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateLinkCode_Space_As_RequestTime_Neg, endPoint=/v1/esignet/linked-authorization/link-code, role=resident, templateFields=null, input={ "requestTime": " ", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Other_Valid_Smoke_sid_transactionId$" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/GenerateLinkCode/GenerateLinkCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Generate link code with only space in requestTime, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateLinkCode_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/link-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Valid_Smoke_sid_transactionId$" }, output={ }, inputTemplate=esignet/GenerateLinkCode/GenerateLinkCode, outputTemplate=esignet/GenerateLinkCode/GenerateLinkCodeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Generate link code with all valid details, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkTransaction_Consent_Vid_SameClaim_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/link-transaction, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkCode": "$ID:GenerateLinkCode_Consent_Vid_SameClaim_all_Valid_Smoke_sid_linkCode$" }, output={ }, inputTemplate=esignet/LinkTransaction/LinkTransaction, outputTemplate=esignet/LinkTransaction/LinkTransactionResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=link transaction consent VID with same claim and all valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:99)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkTransaction_Consent_Vid_User2_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/link-transaction, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkCode": "$ID:GenerateLinkCode_Consent_Vid_User2_all_Valid_Smoke_sid_linkCode$" }, output={ }, inputTemplate=esignet/LinkTransaction/LinkTransaction, outputTemplate=esignet/LinkTransaction/LinkTransactionResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=link transaction consent VID User2 with all valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:99)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkTransaction_Vid_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/link-transaction, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkCode": "$ID:GenerateLinkCode_Vid_all_Valid_Smoke_sid_linkCode$" }, output={ }, inputTemplate=esignet/LinkTransaction/LinkTransaction, outputTemplate=esignet/LinkTransaction/LinkTransactionResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=link transaction VID with all valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:99)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkTransaction_Absent_RequestTime_Neg, endPoint=/v1/esignet/linked-authorization/link-transaction, role=resident, templateFields=null, input={ "requestTime": "$IGNORE$", "linkCode": "$ID:GenerateLinkCode_all_Valid_Smoke_sid_linkCode$" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/LinkTransaction/LinkTransaction, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=link transaction without requestTime, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkTransaction_Consent_uin_SameClaim_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/link-transaction, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkCode": "$ID:GenerateLinkCode_Consent_uin_SameClaim_all_Valid_Smoke_sid_linkCode$" }, output={ }, inputTemplate=esignet/LinkTransaction/LinkTransaction, outputTemplate=esignet/LinkTransaction/LinkTransactionResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=link transaction consent UIN with same claim and all valid details, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkTransaction_Consent_uin_User2_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/link-transaction, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkCode": "$ID:GenerateLinkCode_Consent_uin_User2_all_Valid_Smoke_sid_linkCode$" }, output={ }, inputTemplate=esignet/LinkTransaction/LinkTransaction, outputTemplate=esignet/LinkTransaction/LinkTransactionResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=link transaction consent UIN User2 with all valid details, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkTransaction_Empty_LinkCode_Neg, endPoint=/v1/esignet/linked-authorization/link-transaction, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkCode": "" }, output={ "errors": [ { "errorCode": "invalid_link_code", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/LinkTransaction/LinkTransaction, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=link transaction with empty value in linkCode, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkTransaction_Empty_RequestTime_Neg, endPoint=/v1/esignet/linked-authorization/link-transaction, role=resident, templateFields=null, input={ "requestTime": "", "linkCode": "$ID:GenerateLinkCode_all_Valid_Smoke_sid_linkCode$" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/LinkTransaction/LinkTransaction, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=link transaction with empty value in requestTime, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkTransaction_Expired_LinkCode_Neg, endPoint=/v1/esignet/linked-authorization/link-transaction, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkCode": "8VaJtjUopVpq8Hd" }, output={ "errors": [ { "errorCode": "invalid_link_code", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/LinkTransaction/LinkTransaction, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=link transaction with expired linkCode, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkTransaction_Invalid_LinkCode_Neg, endPoint=/v1/esignet/linked-authorization/link-transaction, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkCode": "$5Ng" }, output={ "errors": [ { "errorCode": "invalid_link_code", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/LinkTransaction/LinkTransaction, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=link transaction with invalid linkCode, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkTransaction_Invalid_RequestTime_Neg, endPoint=/v1/esignet/linked-authorization/link-transaction, role=resident, templateFields=null, input={ "requestTime": "2022-11-08T06:35:53", "linkCode": "$ID:GenerateLinkCode_all_Valid_Smoke_sid_linkCode$" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/LinkTransaction/LinkTransaction, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=link transaction with invalid requestTime, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkTransaction_Missing_val_LinkCode_Neg, endPoint=/v1/esignet/linked-authorization/link-transaction, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkCode": "$REMOVE$" }, output={ "errors": [ { "errorCode": "invalid_link_code", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/LinkTransaction/LinkTransaction, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=link transaction without linkCode, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkTransaction_Null_LinkCode_Neg, endPoint=/v1/esignet/linked-authorization/link-transaction, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkCode": "null" }, output={ "errors": [ { "errorCode": "invalid_link_code", "errorMessage": "$IGONRE$" } ] }, inputTemplate=esignet/LinkTransaction/LinkTransaction, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=link transaction with Null in linkCode, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkTransaction_RequestTime_FutureValue_Neg, endPoint=/v1/esignet/linked-authorization/link-transaction, role=resident, templateFields=null, input={ "requestTime": "2024-01-16T00:17:54.649Z", "linkCode": "$ID:GenerateLinkCode_all_Valid_Smoke_sid_linkCode$" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/LinkTransaction/LinkTransaction, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=link transaction with future value in requestTime, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkTransaction_RequestTime_PastValue_Neg, endPoint=/v1/esignet/linked-authorization/link-transaction, role=resident, templateFields=null, input={ "requestTime": "2023-01-16T00:17:54.649Z", "linkCode": "$ID:GenerateLinkCode_all_Valid_Smoke_sid_linkCode$" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/LinkTransaction/LinkTransaction, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=link transaction with past value in requestTime, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkTransaction_Space_Val_RequestTime_Neg, endPoint=/v1/esignet/linked-authorization/link-transaction, role=resident, templateFields=null, input={ "requestTime": " ", "linkCode": "$ID:GenerateLinkCode_all_Valid_Smoke_sid_linkCode$" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/LinkTransaction/LinkTransaction, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=link transaction with only space in requestTime, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkTransaction_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/link-transaction, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkCode": "$ID:GenerateLinkCode_all_Valid_Smoke_sid_linkCode$" }, output={ }, inputTemplate=esignet/LinkTransaction/LinkTransaction, outputTemplate=esignet/LinkTransaction/LinkTransactionResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=link transaction with all valid details, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetLinkStatus_Consent_Vid_SameClaim_all_Valid_Smoke, endPoint=/v1/esignet/linked-authorization/link-status, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Consent_SameClaim_Vid_Valid_Smoke_sid_transactionId$", "linkCode": "$ID:GenerateLinkCode_Consent_Vid_SameClaim_all_Valid_Smoke_sid_linkCode$" }, output={ }, inputTemplate=esignet/GetLinkStatus/GetLinkStatus, outputTemplate=esignet/GetLinkStatus/GetLinkStatusResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Get link status consent UIN with same claim and all valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:97)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_GetLinkStatus_Consent_Vid_User2_all_Valid_Smoke, endPoint=/v1/esignet/linked-authorization/link-status, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Consent_User2_Vid_Valid_Smoke_sid_transactionId$", "linkCode": "$ID:GenerateLinkCode_Consent_Vid_User2_all_Valid_Smoke_sid_linkCode$" }, output={ }, inputTemplate=esignet/GetLinkStatus/GetLinkStatus, outputTemplate=esignet/GetLinkStatus/GetLinkStatusResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Get link status consent VID User2 with all valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:97)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_GetLinkStatus_Vid_all_Valid_Smoke, endPoint=/v1/esignet/linked-authorization/link-status, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Vid_Valid_Smoke_sid_transactionId$", "linkCode": "$ID:GenerateLinkCode_Vid_all_Valid_Smoke_sid_linkCode$" }, output={ }, inputTemplate=esignet/GetLinkStatus/GetLinkStatus, outputTemplate=esignet/GetLinkStatus/GetLinkStatusResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Get link status with all valid details VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:97)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_GetLinkStatus_Consent_uin_SameClaim_all_Valid_Smoke, endPoint=/v1/esignet/linked-authorization/link-status, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Consent_SameClaim_Uin_Valid_Smoke_sid_transactionId$", "linkCode": "$ID:GenerateLinkCode_Consent_uin_SameClaim_all_Valid_Smoke_sid_linkCode$" }, output={ }, inputTemplate=esignet/GetLinkStatus/GetLinkStatus, outputTemplate=esignet/GetLinkStatus/GetLinkStatusResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Get link status consent UIN with same claim and all valid details, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetLinkStatus_Consent_uin_User2_all_Valid_Smoke, endPoint=/v1/esignet/linked-authorization/link-status, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Consent_User2_Uin_Valid_Smoke_sid_transactionId$", "linkCode": "$ID:GenerateLinkCode_Consent_uin_User2_all_Valid_Smoke_sid_linkCode$" }, output={ }, inputTemplate=esignet/GetLinkStatus/GetLinkStatus, outputTemplate=esignet/GetLinkStatus/GetLinkStatusResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Get link status consent UIN User2 with all valid details, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetLinkStatus_Empty_LinkCode_Neg, endPoint=/v1/esignet/linked-authorization/link-status, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Other_Valid_Smoke_sid_transactionId$", "linkCode": "" }, output={ "errors": [ { "errorCode": "invalid_link_code", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/GetLinkStatus/GetLinkStatus, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Get link status with empty linkCode, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetLinkStatus_Empty_TransactionId_Neg, endPoint=/v1/esignet/linked-authorization/link-status, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "", "linkCode": "$ID:GenerateLinkCode_all_Valid_Smoke_sid_linkCode$" }, output={ "errors": [ { "errorCode": "invalid_transaction_id", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/GetLinkStatus/GetLinkStatus, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Get link status with empty transactionId, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetLinkStatus_Expired_LinkCode_Neg, endPoint=/v1/esignet/linked-authorization/link-status, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Other_Valid_Smoke_sid_transactionId$", "linkCode": "y7djExbsje5uzKi" }, output={ "errors": [ { "errorCode": "response_timeout", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/GetLinkStatus/GetLinkStatus, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Get link status with expired linkCode, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetLinkStatus_Expired_TransactionId_Neg, endPoint=/v1/esignet/linked-authorization/link-status, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "4eKDB4GPk6fP8XXEDY7rktwtQF6WiwrOCehT2CwyVT0", "linkCode": "$ID:GenerateLinkCode_all_Valid_Smoke_sid_linkCode$" }, output={ "errors": [ { "errorCode": "response_timeout", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/GetLinkStatus/GetLinkStatus, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Get link status with expired transactionId, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetLinkStatus_Future_RequestTime_Neg, endPoint=/v1/esignet/linked-authorization/link-status, role=resident, templateFields=null, input={ "requestTime": "2033-11-07T06:51:30.195Z", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Other_Valid_Smoke_sid_transactionId$", "linkCode": "$ID:GenerateLinkCode_all_Valid_Smoke_sid_linkCode$" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/GetLinkStatus/GetLinkStatus, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Get link status with future value in requestTime, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetLinkStatus_Invalid_LinkCode_Neg, endPoint=/v1/esignet/linked-authorization/link-status, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Other_Valid_Smoke_sid_transactionId$", "linkCode": "linkCode" }, output={ "errors": [ { "errorCode": "response_timeout", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/GetLinkStatus/GetLinkStatus, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Get link status with invalid linkCode, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetLinkStatus_Invalid_RequestTime_Neg, endPoint=/v1/esignet/linked-authorization/link-status, role=resident, templateFields=null, input={ "requestTime": "2022-11-08T06:35:53", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Other_Valid_Smoke_sid_transactionId$", "linkCode": "$ID:GenerateLinkCode_all_Valid_Smoke_sid_linkCode$" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/GetLinkStatus/GetLinkStatus, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Get link status with invalid requestTime, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetLinkStatus_Invalid_TransactionId_Neg, endPoint=/v1/esignet/linked-authorization/link-status, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "transactionId", "linkCode": "$ID:GenerateLinkCode_all_Valid_Smoke_sid_linkCode$" }, output={ "errors": [ { "errorCode": "response_timeout", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/GetLinkStatus/GetLinkStatus, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Get link status with invalid transactionId, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetLinkStatus_Missing_LinkCode_Neg, endPoint=/v1/esignet/linked-authorization/link-status, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Other_Valid_Smoke_sid_transactionId$", "linkCode": "$REMOVE$" }, output={ "errors": [ { "errorCode": "invalid_link_code", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/GetLinkStatus/GetLinkStatus, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Get link status without linkCode, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetLinkStatus_Missing_RequestTime_Neg, endPoint=/v1/esignet/linked-authorization/link-status, role=resident, templateFields=null, input={ "requestTime": "$REMOVE$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Other_Valid_Smoke_sid_transactionId$", "linkCode": "$ID:GenerateLinkCode_all_Valid_Smoke_sid_linkCode$" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/GetLinkStatus/GetLinkStatus, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Get link status without requestTime, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetLinkStatus_Missing_TransactionId_Neg, endPoint=/v1/esignet/linked-authorization/link-status, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$REMOVE$", "linkCode": "$ID:GenerateLinkCode_all_Valid_Smoke_sid_linkCode$" }, output={ "errors": [ { "errorCode": "invalid_transaction_id", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/GetLinkStatus/GetLinkStatus, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Get link status without transactionId, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetLinkStatus_Null_LinkCode_Neg, endPoint=/v1/esignet/linked-authorization/link-status, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Other_Valid_Smoke_sid_transactionId$", "linkCode": "null" }, output={ "errors": [ { "errorCode": "response_timeout", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/GetLinkStatus/GetLinkStatus, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Get link status with Null in linkCode, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetLinkStatus_Null_TransactionId_Neg, endPoint=/v1/esignet/linked-authorization/link-status, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "null", "linkCode": "$ID:GenerateLinkCode_all_Valid_Smoke_sid_linkCode$" }, output={ "errors": [ { "errorCode": "response_timeout", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/GetLinkStatus/GetLinkStatus, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Get link status with Null in transactionId, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetLinkStatus_Past_RequestTime_Neg, endPoint=/v1/esignet/linked-authorization/link-status, role=resident, templateFields=null, input={ "requestTime": "2022-11-07T06:51:30.195Z", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Other_Valid_Smoke_sid_transactionId$", "linkCode": "$ID:GenerateLinkCode_all_Valid_Smoke_sid_linkCode$" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/GetLinkStatus/GetLinkStatus, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Get link status with past value in requestTime, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetLinkStatus_SpaceVal_LinkCode_Neg, endPoint=/v1/esignet/linked-authorization/link-status, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Other_Valid_Smoke_sid_transactionId$", "linkCode": " " }, output={ "errors": [ { "errorCode": "invalid_link_code", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/GetLinkStatus/GetLinkStatus, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Get link status with space in linkCode, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetLinkStatus_SpaceVal_RequestTime_Neg, endPoint=/v1/esignet/linked-authorization/link-status, role=resident, templateFields=null, input={ "requestTime": " ", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Other_Valid_Smoke_sid_transactionId$", "linkCode": "$ID:GenerateLinkCode_all_Valid_Smoke_sid_linkCode$" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/GetLinkStatus/GetLinkStatus, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Get link status with only space in requestTime, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetLinkStatus_SpaceVal_TransactionId_Neg, endPoint=/v1/esignet/linked-authorization/link-status, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": " ", "linkCode": "$ID:GenerateLinkCode_all_Valid_Smoke_sid_linkCode$" }, output={ "errors": [ { "errorCode": "invalid_transaction_id", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/GetLinkStatus/GetLinkStatus, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Get link status with only space in transactionId, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetLinkStatus_all_Valid_Smoke, endPoint=/v1/esignet/linked-authorization/link-status, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Valid_Smoke_sid_transactionId$", "linkCode": "$ID:GenerateLinkCode_all_Valid_Smoke_sid_linkCode$" }, output={ }, inputTemplate=esignet/GetLinkStatus/GetLinkStatus, outputTemplate=esignet/GetLinkStatus/GetLinkStatusResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Get link status with all valid details, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkedAuthenticationWla_Consent_SameClaim_Vid_SCert_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/v2/authenticate, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkTransactionId": "$ID:LinkTransaction_Consent_Vid_SameClaim_all_Valid_Smoke_sid_linkTransactionId$", "individualId": "$ID:Generate_Perpetual_VID_Linked_Consent_Valid_Smoke_sid_vid$", "authFactorType": "WLA", "challenge": "$WLATOKENCONSENTVIDSAMECLAIM$", "format": "jwt", "sendOtp":{ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Linked_Consent_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp", }, "validateOtp":{ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Linked_Consent_Valid_Smoke_sid_vid$", "authFactorType1": "WLA", "format1": "jwt", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Linked_Consent_Vid_smoke_Pos_EMAIL$", "format": "alpha-numeric", "publicKey": "$BINDINGCONSENTSAMECLAIMVIDJWKKEY$", "validateOtpReqTemplate": "esignet/WalletBinding/WalletBinding", "validateOtpEndPoint": "/v1/esignet/binding/wallet-binding" } }, output={ "consentAction": "CAPTURE", "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" }, "validateOtpResp":{ "sendOtpResTemplate":"esignet/WalletBinding/WalletBindingResult" } }, inputTemplate=esignet/LinkedAuthenticationWla/LinkedAuthenticationWla, outputTemplate=esignet/LinkedConsent/LinkedAuthenticationConsentWla/LinkedAuthenticationConsentWlaResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Linked AuthenticationWla consent same claim VID SCert all valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerateForWla.test(PostWithAutogenIdWithOtpGenerateForWla.java:92)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkedAuthenticationWla_Consent_User2_Vid_SCert_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/v2/authenticate, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkTransactionId": "$ID:LinkTransaction_Consent_Vid_User2_all_Valid_Smoke_sid_linkTransactionId$", "individualId": "$ID:Generate_Perpetual_VID_Linked_Consent_User2_Valid_Smoke_sid_vid$", "authFactorType": "WLA", "challenge": "$WLATOKENCONSENTVIDUSER2$", "format": "jwt", "sendOtp":{ "apiKey": "$ID:GenerateApiKeyKyc_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_Kyc_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Linked_Consent_User2_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp", }, "validateOtp":{ "apiKey": "$ID:GenerateApiKeyKyc_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_Kyc_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Linked_Consent_User2_Valid_Smoke_sid_vid$", "authFactorType1": "WLA", "format1": "jwt", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Linked_Consent_User2_Vid_smoke_Pos_EMAIL$", "format": "alpha-numeric", "publicKey": "$BINDINGCONSENTVIDUSER2JWKKEY$", "validateOtpReqTemplate": "esignet/WalletBinding/WalletBinding", "validateOtpEndPoint": "/v1/esignet/binding/wallet-binding" } }, output={ "consentAction": "CAPTURE", "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" }, "validateOtpResp":{ "sendOtpResTemplate":"esignet/WalletBinding/WalletBindingResult" } }, inputTemplate=esignet/LinkedAuthenticationWla/LinkedAuthenticationWla, outputTemplate=esignet/LinkedConsent/LinkedAuthenticationConsentWla/LinkedAuthenticationConsentWlaResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Linked AuthenticationWla consent User2 UIN SCert all valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerateForWla.test(PostWithAutogenIdWithOtpGenerateForWla.java:92)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkedAuthenticationWla_Vid_SCert_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/authenticate, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkTransactionId": "$ID:LinkTransaction_Vid_all_Valid_Smoke_sid_linkTransactionId$", "individualId": "$ID:Generate_Perpetual_VID_LinkedSce_Valid_Smoke_sid_vid$", "authFactorType": "WLA", "challenge": "$WLATOKENVID$", "format": "jwt", "sendOtp":{ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_LinkedSce_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp", }, "validateOtp":{ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_LinkedSce_Valid_Smoke_sid_vid$", "authFactorType1": "WLA", "format1": "jwt", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Linked_Sce_smoke_Pos_EMAIL$", "format": "alpha-numeric", "publicKey": "$BINDINGJWKKEYVID$", "validateOtpReqTemplate": "esignet/WalletBinding/WalletBinding", "validateOtpEndPoint": "/v1/esignet/binding/wallet-binding" } }, output={ "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" }, "validateOtpResp":{ "sendOtpResTemplate":"esignet/WalletBinding/WalletBindingResult" } }, inputTemplate=esignet/LinkedAuthenticationWla/LinkedAuthenticationWla, outputTemplate=esignet/LinkedAuthenticationWla/LinkedAuthenticationWlaResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Linked AuthenticationWla VID SCert all valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerateForWla.test(PostWithAutogenIdWithOtpGenerateForWla.java:92)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkedAuthenticationWla_Consent_SameClaim_uin_SCert_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/v2/authenticate, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkTransactionId": "$ID:LinkTransaction_Consent_uin_SameClaim_all_Valid_Smoke_sid_linkTransactionId$", "individualId": "$ID:AddIdentity_Linked_Consent_smoke_Pos_UIN$", "authFactorType": "WLA", "challenge": "$WLATOKENCONSENTSAMECLAIM$", "format": "jwt", "sendOtp":{ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Linked_Consent_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp", }, "validateOtp":{ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Linked_Consent_smoke_Pos_UIN$", "authFactorType1": "WLA", "format1": "jwt", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Linked_Consent_smoke_Pos_EMAIL$", "format": "alpha-numeric", "publicKey": "$BINDINGCONSENTSAMECLAIMJWKKEY$", "validateOtpReqTemplate": "esignet/WalletBinding/WalletBinding", "validateOtpEndPoint": "/v1/esignet/binding/wallet-binding" } }, output={ "consentAction": "CAPTURE", "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" }, "validateOtpResp":{ "sendOtpResTemplate":"esignet/WalletBinding/WalletBindingResult" } }, inputTemplate=esignet/LinkedAuthenticationWla/LinkedAuthenticationWla, outputTemplate=esignet/LinkedConsent/LinkedAuthenticationConsentWla/LinkedAuthenticationConsentWlaResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Linked AuthenticationWla consent same claim UIN SCert all valid details, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkedAuthenticationWla_Consent_User2_uin_SCert_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/v2/authenticate, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkTransactionId": "$ID:LinkTransaction_Consent_uin_User2_all_Valid_Smoke_sid_linkTransactionId$", "individualId": "$ID:AddIdentity_Linked_Consent_User2_smoke_Pos_UIN$", "authFactorType": "WLA", "challenge": "$WLATOKENCONSENTUSER2$", "format": "jwt", "sendOtp":{ "apiKey": "$ID:GenerateApiKeyKyc_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_Kyc_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Linked_Consent_User2_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp", }, "validateOtp":{ "apiKey": "$ID:GenerateApiKeyKyc_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_Kyc_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Linked_Consent_User2_smoke_Pos_UIN$", "authFactorType1": "WLA", "format1": "jwt", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Linked_Consent_User2_smoke_Pos_EMAIL$", "format": "alpha-numeric", "publicKey": "$BINDINGCONSENTUSER2JWKKEY$", "validateOtpReqTemplate": "esignet/WalletBinding/WalletBinding", "validateOtpEndPoint": "/v1/esignet/binding/wallet-binding" } }, output={ "consentAction": "CAPTURE", "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" }, "validateOtpResp":{ "sendOtpResTemplate":"esignet/WalletBinding/WalletBindingResult" } }, inputTemplate=esignet/LinkedAuthenticationWla/LinkedAuthenticationWla, outputTemplate=esignet/LinkedConsent/LinkedAuthenticationConsentWla/LinkedAuthenticationConsentWlaResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Linked AuthenticationWla consent User2 UIN SCert all valid details, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkedAuthenticationWla_uin_SCert_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/authenticate, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkTransactionId": "$ID:LinkTransaction_all_Valid_Smoke_sid_linkTransactionId$", "individualId": "$ID:AddIdentity_Linked_Sce_smoke_Pos_UIN$", "authFactorType": "WLA", "challenge": "$WLATOKEN$", "format": "jwt", "sendOtp":{ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Linked_Sce_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp", }, "validateOtp":{ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Linked_Sce_smoke_Pos_UIN$", "authFactorType1": "WLA", "format1": "jwt", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Linked_Sce_smoke_Pos_EMAIL$", "format": "alpha-numeric", "publicKey": "$BINDINGJWKKEY$", "validateOtpReqTemplate": "esignet/WalletBinding/WalletBinding", "validateOtpEndPoint": "/v1/esignet/binding/wallet-binding" } }, output={ "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" }, "validateOtpResp":{ "sendOtpResTemplate":"esignet/WalletBinding/WalletBindingResult" } }, inputTemplate=esignet/LinkedAuthenticationWla/LinkedAuthenticationWla, outputTemplate=esignet/LinkedAuthenticationWla/LinkedAuthenticationWlaResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Linked AuthenticationWla UIN SCert all valid details, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkedAuthorizationConsent_Consent_Vid_SameClaim_Pos, endPoint=/v1/esignet/linked-authorization/v2/consent, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkedTransactionId": "$ID:LinkTransaction_Consent_Vid_SameClaim_all_Valid_Smoke_sid_linkTransactionId$", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}], "signature": "$CONSENTDETACHEDSIGNATUREVIDSAMECLAIM$" }, output={ }, inputTemplate=esignet/LinkedConsent/LinkAuthorizationConsent/LinkAuthorizationConsent, outputTemplate=esignet/LinkedAuthorizationConsent/LinkedAuthorizationConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Linked authorization consent with same claim VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:97)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkedAuthorizationConsent_Consent_Vid_User2, endPoint=/v1/esignet/linked-authorization/v2/consent, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkedTransactionId": "$ID:LinkTransaction_Consent_Vid_User2_all_Valid_Smoke_sid_linkTransactionId$", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}], "signature": "$CONSENTDETACHEDSIGNATUREVIDUSER2$" }, output={ }, inputTemplate=esignet/LinkedConsent/LinkAuthorizationConsent/LinkAuthorizationConsent, outputTemplate=esignet/LinkedAuthorizationConsent/LinkedAuthorizationConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Linked authorization consent with User2 VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:97)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkedAuthorizationConsent_Vid_All_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/consent, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkedTransactionId": "$ID:LinkTransaction_Vid_all_Valid_Smoke_sid_linkTransactionId$", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}] }, output={ }, inputTemplate=esignet/LinkedAuthorizationConsent/LinkedAuthorizationConsent, outputTemplate=esignet/LinkedAuthorizationConsent/LinkedAuthorizationConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Linked authorization consent with all valid details VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:97)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkedAuthorizationConsent_All_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/consent, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkedTransactionId": "$ID:LinkTransaction_all_Valid_Smoke_sid_linkTransactionId$", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}] }, output={ }, inputTemplate=esignet/LinkedAuthorizationConsent/LinkedAuthorizationConsent, outputTemplate=esignet/LinkedAuthorizationConsent/LinkedAuthorizationConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Linked authorization consent with all valid details, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkedAuthorizationConsent_Consent_uin_SameClaim_Pos, endPoint=/v1/esignet/linked-authorization/v2/consent, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkedTransactionId": "$ID:LinkTransaction_Consent_uin_SameClaim_all_Valid_Smoke_sid_linkTransactionId$", "acceptedClaims": [{claim: "name"},{claim: "email"}], "signature": "$CONSENTDETACHEDSIGNATURESAMECLAIM$" }, output={ }, inputTemplate=esignet/LinkedConsent/LinkAuthorizationConsent/LinkAuthorizationConsent, outputTemplate=esignet/LinkedAuthorizationConsent/LinkedAuthorizationConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Linked authorization consent with same claim UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkedAuthorizationConsent_Consent_uin_User2, endPoint=/v1/esignet/linked-authorization/v2/consent, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkedTransactionId": "$ID:LinkTransaction_Consent_uin_User2_all_Valid_Smoke_sid_linkTransactionId$", "acceptedClaims": [{claim: "name"},{claim: "email"}], "signature": "$CONSENTDETACHEDSIGNATUREUSER2$" }, output={ }, inputTemplate=esignet/LinkedConsent/LinkAuthorizationConsent/LinkAuthorizationConsent, outputTemplate=esignet/LinkedAuthorizationConsent/LinkedAuthorizationConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Linked authorization consent with User2 UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkedAuthorizationConsent_Empty_TransactionId_Neg, endPoint=/v1/esignet/linked-authorization/consent, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkedTransactionId": "" }, output={ "errors": [ { "errorCode": "invalid_transaction_id", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/LinkedAuthorizationConsent/LinkedAuthorizationConsent, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Linked authorization consent with empty transactionId, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkedAuthorizationConsent_Empty_Val_RequestTime_Neg, endPoint=/v1/esignet/linked-authorization/consent, role=resident, templateFields=null, input={ "requestTime": "", "linkedTransactionId": "$ID:LinkTransaction_all_Valid_Smoke_sid_linkTransactionId$" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/LinkedAuthorizationConsent/LinkedAuthorizationConsent, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Linked authorization consent with empty value in requestTime, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkedAuthorizationConsent_Future_Val_RequestTime_Neg, endPoint=/v1/esignet/linked-authorization/consent, role=resident, templateFields=null, input={ "requestTime": "2024-01-16T00:17:54.649Z", "linkedTransactionId": "$ID:LinkTransaction_all_Valid_Smoke_sid_linkTransactionId$" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/LinkedAuthorizationConsent/LinkedAuthorizationConsent, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Linked authorization consent with future value in requestTime, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkedAuthorizationConsent_Invalid_AcceptedClaims_Neg, endPoint=/v1/esignet/linked-authorization/consent, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkedTransactionId": "$ID:LinkTransaction_all_Valid_Smoke_sid_linkTransactionId$", "acceptedClaims": [{claim: "$E23Teda"}] }, output={ "errors": [ { "errorCode": "invalid_transaction", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/LinkedAuthorizationConsent/LinkedAuthorizationConsent, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Linked authorization consent with invalid accepted claims, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkedAuthorizationConsent_Invalid_RequestTime_Neg, endPoint=/v1/esignet/linked-authorization/consent, role=resident, templateFields=null, input={ "requestTime": "2022-11-08T06:35:53", "linkedTransactionId": "$ID:LinkTransaction_all_Valid_Smoke_sid_linkTransactionId$" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/LinkedAuthorizationConsent/LinkedAuthorizationConsent, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Linked authorization consent with invalid requestTime, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkedAuthorizationConsent_Invalid_TransactionId_Neg, endPoint=/v1/esignet/linked-authorization/consent, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkedTransactionId": "!$j6" }, output={ "errors": [ { "errorCode": "invalid_transaction", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/LinkedAuthorizationConsent/LinkedAuthorizationConsent, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Linked authorization consent with invalid transactionId, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkedAuthorizationConsent_Invalid_permittedAuthorizeScopes_Neg, endPoint=/v1/esignet/linked-authorization/consent, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkedTransactionId": "$ID:LinkTransaction_all_Valid_Smoke_sid_linkTransactionId$", "permittedAuthorizeScopes": [{scope: "$absc34"}], "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}] }, output={ "errors": [ { "errorCode": "invalid_transaction", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/LinkedAuthorizationConsent/LinkedAuthorizationConsent, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Linked authorization consent with invalid accepted claims, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkedAuthorizationConsent_Missing_TransactionId_Neg, endPoint=/v1/esignet/linked-authorization/consent, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkedTransactionId": "$REMOVE$" }, output={ "errors": [ { "errorCode": "invalid_transaction_id", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/LinkedAuthorizationConsent/LinkedAuthorizationConsent, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Linked authorization consent without transactionId, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkedAuthorizationConsent_Null_AcceptedClaims_Neg, endPoint=/v1/esignet/linked-authorization/consent, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkedTransactionId": "$ID:LinkTransaction_all_Valid_Smoke_sid_linkTransactionId$", "acceptedClaims": [{claim: "null"}] }, output={ "errors": [ { "errorCode": "invalid_transaction", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/LinkedAuthorizationConsent/LinkedAuthorizationConsent, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Linked authorization consent with Null in accepted claims, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkedAuthorizationConsent_Null_permittedAuthorizeScopes_Neg, endPoint=/v1/esignet/linked-authorization/consent, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkedTransactionId": "$ID:LinkTransaction_all_Valid_Smoke_sid_linkTransactionId$", "permittedAuthorizeScopes": [{scope: "null"}], "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}] }, output={ "errors": [ { "errorCode": "invalid_transaction", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/LinkedAuthorizationConsent/LinkedAuthorizationConsent, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Linked authorization consent with Null in permittedAuthorizeScopes, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkedAuthorizationConsent_Past_Val_RequestTime_Neg, endPoint=/v1/esignet/linked-authorization/consent, role=resident, templateFields=null, input={ "requestTime": "2023-01-16T00:17:54.649Z", "linkedTransactionId": "$ID:LinkTransaction_all_Valid_Smoke_sid_linkTransactionId$" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/LinkedAuthorizationConsent/LinkedAuthorizationConsent, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Linked authorization consent with past value in requestTime, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkedAuthorizationConsent_Space_Val_RequestTime_Neg, endPoint=/v1/esignet/linked-authorization/consent, role=resident, templateFields=null, input={ "requestTime": " ", "linkedTransactionId": "$ID:LinkTransaction_all_Valid_Smoke_sid_linkTransactionId$" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/LinkedAuthorizationConsent/LinkedAuthorizationConsent, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Linked authorization consent with only space in requestTime, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkedAuthorizationConsent_Space_Val_TransactionId_Neg, endPoint=/v1/esignet/linked-authorization/consent, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkedTransactionId": " " }, output={ "errors": [ { "errorCode": "invalid_transaction_id", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/LinkedAuthorizationConsent/LinkedAuthorizationConsent, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Linked authorization consent with space in transactionId, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkAuthorizationCode_Consent_Vid_SameClaim_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/link-auth-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Consent_SameClaim_Vid_Valid_Smoke_sid_transactionId$", "linkedCode": "$ID:GenerateLinkCode_Consent_Vid_SameClaim_all_Valid_Smoke_sid_linkCode$" }, output={ }, inputTemplate=esignet/LinkAuthorizationCode/LinkAuthorizationCode, outputTemplate=esignet/LinkAuthorizationCode/LinkAuthorizationCodeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Link Authorization code consent VID with same claim and all valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:99)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkAuthorizationCode_Consent_Vid_User2_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/link-auth-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Consent_User2_Vid_Valid_Smoke_sid_transactionId$", "linkedCode": "$ID:GenerateLinkCode_Consent_Vid_User2_all_Valid_Smoke_sid_linkCode$" }, output={ }, inputTemplate=esignet/LinkAuthorizationCode/LinkAuthorizationCode, outputTemplate=esignet/LinkAuthorizationCode/LinkAuthorizationCodeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Link Authorization code consent VID for User2 with all valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:99)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkAuthorizationCode_Vid_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/link-auth-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Vid_Valid_Smoke_sid_transactionId$", "linkedCode": "$ID:GenerateLinkCode_Vid_all_Valid_Smoke_sid_linkCode$" }, output={ }, inputTemplate=esignet/LinkAuthorizationCode/LinkAuthorizationCode, outputTemplate=esignet/LinkAuthorizationCode/LinkAuthorizationCodeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Link Authorization code with all valid details VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:99)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkAuthorizationCode_Consent_uin_SameClaim_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/link-auth-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Consent_SameClaim_Uin_Valid_Smoke_sid_transactionId$", "linkedCode": "$ID:GenerateLinkCode_Consent_uin_SameClaim_all_Valid_Smoke_sid_linkCode$" }, output={ }, inputTemplate=esignet/LinkAuthorizationCode/LinkAuthorizationCode, outputTemplate=esignet/LinkAuthorizationCode/LinkAuthorizationCodeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Link Authorization code consent UIN with same claim and all valid details, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkAuthorizationCode_Consent_uin_User2_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/link-auth-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Consent_User2_Uin_Valid_Smoke_sid_transactionId$", "linkedCode": "$ID:GenerateLinkCode_Consent_uin_User2_all_Valid_Smoke_sid_linkCode$" }, output={ }, inputTemplate=esignet/LinkAuthorizationCode/LinkAuthorizationCode, outputTemplate=esignet/LinkAuthorizationCode/LinkAuthorizationCodeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Link Authorization code consent UIN for User2 with all valid details, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkAuthorizationCode_Empty_TransactionId_Neg, endPoint=/v1/esignet/linked-authorization/link-auth-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "", "linkedCode": "$ID:GenerateLinkCode_all_Valid_Smoke_sid_linkCode$" }, output={ "errors": [ { "errorCode": "invalid_transaction_id", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/LinkAuthorizationCode/LinkAuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Link Authorization code with empty value in transactionId, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkAuthorizationCode_Empty_Val_linkedCode_Neg, endPoint=/v1/esignet/linked-authorization/link-auth-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Valid_Smoke_sid_transactionId$", "linkedCode": "" }, output={ "errors": [ { "errorCode": "invalid_link_code", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/LinkAuthorizationCode/LinkAuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Link Authorization code with empty value in linkedCode, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkAuthorizationCode_Empty_Val_requestTime_Neg, endPoint=/v1/esignet/linked-authorization/link-auth-code, role=resident, templateFields=null, input={ "requestTime": "", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Valid_Smoke_sid_transactionId$", "linkedCode": "$ID:GenerateLinkCode_all_Valid_Smoke_sid_linkCode$" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/LinkAuthorizationCode/LinkAuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Link Authorization code with empty value in requestTime, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkAuthorizationCode_Future_Val_requestTime_Neg, endPoint=/v1/esignet/linked-authorization/link-auth-code, role=resident, templateFields=null, input={ "requestTime": "2024-01-16T00:17:54.649Z", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Valid_Smoke_sid_transactionId$", "linkedCode": "$ID:GenerateLinkCode_all_Valid_Smoke_sid_linkCode$" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/LinkAuthorizationCode/LinkAuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Link Authorization code with future value requestTime, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkAuthorizationCode_Invalid_TransactionId_Neg, endPoint=/v1/esignet/linked-authorization/link-auth-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$t21!", "linkedCode": "$ID:GenerateLinkCode_all_Valid_Smoke_sid_linkCode$" }, output={ "errors": [ { "errorCode": "response_timeout", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/LinkAuthorizationCode/LinkAuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Link Authorization code with invalid transactionId, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkAuthorizationCode_Invalid_linkedCode_Neg, endPoint=/v1/esignet/linked-authorization/link-auth-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Valid_Smoke_sid_transactionId$", "linkedCode": "$13hj" }, output={ "errors": [ { "errorCode": "response_timeout", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/LinkAuthorizationCode/LinkAuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Link Authorization code with invalid linkedCode, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkAuthorizationCode_Invalid_requestTime_Neg, endPoint=/v1/esignet/linked-authorization/link-auth-code, role=resident, templateFields=null, input={ "requestTime": "2022-11-08T06:35:53", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Valid_Smoke_sid_transactionId$", "linkedCode": "$ID:GenerateLinkCode_all_Valid_Smoke_sid_linkCode$" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/LinkAuthorizationCode/LinkAuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Link Authorization code with invalid requestTime, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkAuthorizationCode_Missing_Val_TransactionId_Neg, endPoint=/v1/esignet/linked-authorization/link-auth-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$REMOVE$", "linkedCode": "$ID:GenerateLinkCode_all_Valid_Smoke_sid_linkCode$" }, output={ "errors": [ { "errorCode": "invalid_transaction_id", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/LinkAuthorizationCode/LinkAuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Link Authorization code without transactionId, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkAuthorizationCode_Misssing_linkedCode_Neg, endPoint=/v1/esignet/linked-authorization/link-auth-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Valid_Smoke_sid_transactionId$", "linkedCode": "$REMOVE$" }, output={ "errors": [ { "errorCode": "invalid_link_code", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/LinkAuthorizationCode/LinkAuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Link Authorization code without linkedCode, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkAuthorizationCode_Past_Val_requestTime_Neg, endPoint=/v1/esignet/linked-authorization/link-auth-code, role=resident, templateFields=null, input={ "requestTime": "2023-01-16T00:17:54.649Z", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Valid_Smoke_sid_transactionId$", "linkedCode": "$ID:GenerateLinkCode_all_Valid_Smoke_sid_linkCode$" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/LinkAuthorizationCode/LinkAuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Link Authorization code with past value in requestTime, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkAuthorizationCode_Space_Val_TransactionId_Neg, endPoint=/v1/esignet/linked-authorization/link-auth-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": " ", "linkedCode": "$ID:GenerateLinkCode_all_Valid_Smoke_sid_linkCode$" }, output={ "errors": [ { "errorCode": "invalid_transaction_id", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/LinkAuthorizationCode/LinkAuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Link Authorization code with only space in transactionId, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkAuthorizationCode_Space_Val_linkedCode_Neg, endPoint=/v1/esignet/linked-authorization/link-auth-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Valid_Smoke_sid_transactionId$", "linkedCode": " " }, output={ "errors": [ { "errorCode": "invalid_link_code", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/LinkAuthorizationCode/LinkAuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Link Authorization code with only space in linkedCode, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkAuthorizationCode_Space_Val_requestTime_Neg, endPoint=/v1/esignet/linked-authorization/link-auth-code, role=resident, templateFields=null, input={ "requestTime": " ", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Valid_Smoke_sid_transactionId$", "linkedCode": "$ID:GenerateLinkCode_all_Valid_Smoke_sid_linkCode$" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/LinkAuthorizationCode/LinkAuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Link Authorization code with only space in requestTime, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkAuthorizationCode_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/link-auth-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Valid_Smoke_sid_transactionId$", "linkedCode": "$ID:GenerateLinkCode_all_Valid_Smoke_sid_linkCode$" }, output={ }, inputTemplate=esignet/LinkAuthorizationCode/LinkAuthorizationCode, outputTemplate=esignet/LinkAuthorizationCode/LinkAuthorizationCodeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Link Authorization code with all valid details, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_Linked_Vid_SameClaim_all_Valid_Smoke_sid, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:LinkAuthorizationCode_Consent_Vid_SameClaim_all_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "token_type": "Bearer" }, inputTemplate=esignet/Consent/GenerateTokenConsent/GenerateTokenConsent, outputTemplate=esignet/Consent/GenerateTokenConsent/GenerateTokenConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token linked VID with same claim and all valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:101)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_Linked_Vid_User2_all_Valid_Smoke_sid, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:LinkAuthorizationCode_Consent_Vid_User2_all_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_Misp_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_USER3_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "token_type": "Bearer" }, inputTemplate=esignet/Consent/GenerateTokenConsent/GenerateTokenConsent, outputTemplate=esignet/Consent/GenerateTokenConsent/GenerateTokenConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token linked VID for User2 with all valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:101)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_Linked_Vid_Valid_Smoke_sid, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:LinkAuthorizationCode_Vid_all_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "token_type": "Bearer" }, inputTemplate=esignet/Consent/GenerateTokenConsent/GenerateTokenConsent, outputTemplate=esignet/Consent/GenerateTokenConsent/GenerateTokenConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token linked VID with all valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:101)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_Linked_uin_SameClaim_all_Valid_Smoke_sid, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:LinkAuthorizationCode_Consent_uin_SameClaim_all_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "token_type": "Bearer" }, inputTemplate=esignet/Consent/GenerateTokenConsent/GenerateTokenConsent, outputTemplate=esignet/Consent/GenerateTokenConsent/GenerateTokenConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token linked UIN with same claim and all valid details, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_Linked_uin_User2_all_Valid_Smoke_sid, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:LinkAuthorizationCode_Consent_uin_User2_all_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_Misp_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_USER3_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "token_type": "Bearer" }, inputTemplate=esignet/Consent/GenerateTokenConsent/GenerateTokenConsent, outputTemplate=esignet/Consent/GenerateTokenConsent/GenerateTokenConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token linked UIN for User2 with all valid details, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_Linked_uin_Valid_Smoke_sid, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:LinkAuthorizationCode_all_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "token_type": "Bearer" }, inputTemplate=esignet/Consent/GenerateTokenConsent/GenerateTokenConsent, outputTemplate=esignet/Consent/GenerateTokenConsent/GenerateTokenConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token linked UIN with all valid details, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetOidcUserInfo_Linked_Vid_IdpAccessToken_StatusCode_SameClaim_Valid_Smoke_sid, endPoint=/v1/esignet/oidc/userinfo, role=resident, templateFields=null, input={ "idpAccessToken": "$ID:GenerateToken_Linked_Vid_SameClaim_all_Valid_Smoke_sid_access_token$" }, output=200, inputTemplate=esignet/Consent/GetOidcUserInfoConsent/GetOidcUserInfoConsent, outputTemplate=esignet/Consent/GetOidcUserInfoConsent/GetOidcUserInfoConsentResult, restMethod=get, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get OIDC user info linked VID with same claim and all valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.GetWithParam.test(GetWithParam.java:95)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_GetOidcUserInfo_Linked_Vid_IdpAccessToken_StatusCode_User2_Valid_Smoke_sid, endPoint=/v1/esignet/oidc/userinfo, role=resident, templateFields=null, input={ "idpAccessToken": "$ID:GenerateToken_Linked_Vid_User2_all_Valid_Smoke_sid_access_token$" }, output=200, inputTemplate=esignet/Consent/GetOidcUserInfoConsent/GetOidcUserInfoConsent, outputTemplate=esignet/Consent/GetOidcUserInfoConsent/GetOidcUserInfoConsentResult, restMethod=get, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get OIDC user info linked VID for user2 with all valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.GetWithParam.test(GetWithParam.java:95)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_GetOidcUserInfo_Linked_Vid_IdpAccessToken_StatusCode_Valid_Smoke_sid, endPoint=/v1/esignet/oidc/userinfo, role=resident, templateFields=null, input={ "idpAccessToken": "$ID:GenerateToken_Linked_Vid_Valid_Smoke_sid_access_token$" }, output=200, inputTemplate=esignet/Consent/GetOidcUserInfoConsent/GetOidcUserInfoConsent, outputTemplate=esignet/Consent/GetOidcUserInfoConsent/GetOidcUserInfoConsentResult, restMethod=get, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get OIDC user info linked VID with all valid details, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.GetWithParam.test(GetWithParam.java:95)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_GetOidcUserInfo_Linked_uin_IdpAccessToken_StatusCode_SameClaim_Valid_Smoke_sid, endPoint=/v1/esignet/oidc/userinfo, role=resident, templateFields=null, input={ "idpAccessToken": "$ID:GenerateToken_Linked_uin_SameClaim_all_Valid_Smoke_sid_access_token$" }, output=200, inputTemplate=esignet/Consent/GetOidcUserInfoConsent/GetOidcUserInfoConsent, outputTemplate=esignet/Consent/GetOidcUserInfoConsent/GetOidcUserInfoConsentResult, restMethod=get, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get OIDC user info linked UIN with same claim and all valid details, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetOidcUserInfo_Linked_uin_IdpAccessToken_StatusCode_User2_Valid_Smoke_sid, endPoint=/v1/esignet/oidc/userinfo, role=resident, templateFields=null, input={ "idpAccessToken": "$ID:GenerateToken_Linked_uin_User2_all_Valid_Smoke_sid_access_token$" }, output=200, inputTemplate=esignet/Consent/GetOidcUserInfoConsent/GetOidcUserInfoConsent, outputTemplate=esignet/Consent/GetOidcUserInfoConsent/GetOidcUserInfoConsentResult, restMethod=get, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get OIDC user info linked UIN for user2 with all valid details, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetOidcUserInfo_Linked_uin_IdpAccessToken_StatusCode_Valid_Smoke_sid, endPoint=/v1/esignet/oidc/userinfo, role=resident, templateFields=null, input={ "idpAccessToken": "$ID:GenerateToken_Linked_uin_Valid_Smoke_sid_access_token$" }, output=200, inputTemplate=esignet/Consent/GetOidcUserInfoConsent/GetOidcUserInfoConsent, outputTemplate=esignet/Consent/GetOidcUserInfoConsent/GetOidcUserInfoConsentResult, restMethod=get, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get OIDC user info linked UIN with all valid details, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_NonAuth_BioFace_Vid_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_NonAuth_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with NonAuth BioFace and all valid details VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:99)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_NonAuth_LeftIris_Vid_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_NonAuth_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with NonAuth LeftIris and all valid details VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:99)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_NonAuth_LeftLittleFinger_Vid_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_NonAuth_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with NonAuth LeftLittleFinger and all valid details VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:99)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_NonAuth_LeftMiddleFingerr_Vid_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_NonAuth_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with NonAuth LeftMiddleFinger and all valid details VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:99)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_NonAuth_LeftThumb_Vid_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_NonAuth_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with NonAuth LeftThumb and all valid details VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:99)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_NonAuth_Otp_Vid_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_NonAuth_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with NonAuth Otp and all valid details VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:99)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_NonAuth_RightIndexFinger_Vid_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_NonAuth_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with NonAuth RightIndexFinger and all valid details VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:99)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_NonAuth_RightIris_Vid_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_NonAuth_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with NonAuth RightIris and all valid details VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:99)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_NonAuth_RightLittleFinger_Vid_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_NonAuth_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with NonAuth RightLittleFinger and all valid details VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:99)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_NonAuth_RightMiddleFinger_Vid_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_NonAuth_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with NonAuth RightMiddleFinger and all valid details VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:99)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_NonAuth_RightRingFinger_Vid_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_NonAuth_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with NonAuth RightRingFinger and all valid details VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:99)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_NonAuth_RightThumb_Vid_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_NonAuth_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with NonAuth RightThumb and all valid details VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:99)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_NonAuth_RingFinger_Vid_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_NonAuth_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with NonAuth RingFinger and all valid details VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:99)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_NonAuth_BioFace_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_NonAuth_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with NonAuth BioFace and all valid details, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_NonAuth_LeftIris_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_NonAuth_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with NonAuth LeftIris and all valid details, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_NonAuth_LeftLittleFinger_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_NonAuth_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with NonAuth LeftLittleFinger and all valid details, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_NonAuth_LeftMiddleFingerr_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_NonAuth_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with NonAuth LeftMiddleFinger and all valid details, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_NonAuth_LeftThumb_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_NonAuth_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with NonAuth LeftThumb and all valid details, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_NonAuth_Otp_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_NonAuth_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with NonAuth Otp and all valid details, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_NonAuth_RightIndexFinger_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_NonAuth_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with NonAuth RightIndexFinger and all valid details, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_NonAuth_RightIris_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_NonAuth_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with NonAuth RightIris and all valid details, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_NonAuth_RightLittleFinger_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_NonAuth_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with NonAuth RightLittleFinger and all valid details, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_NonAuth_RightMiddleFinger_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_NonAuth_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with NonAuth RightMiddleFinger and all valid details, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_NonAuth_RightRingFinger_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_NonAuth_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with NonAuth RightRingFinger and all valid details, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_NonAuth_RightThumb_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_NonAuth_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with NonAuth RightThumb and all valid details, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_NonAuth_RingFinger_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_NonAuth_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with NonAuth RingFinger and all valid details, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_BioAuth_Biometric_Face_NonAuth_With_Valid_uin_Smoke_Pos, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_NonAuth_BioFace_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_NonAuth_BioFace_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_BioAuth_smoke_Pos_UIN$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "UNKNOWN", "bioType": "FACE", "bioValue": "$FACE$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "1873299273", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Full face", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467171", "type": "Face", "transactionId": "$TRANSACTIONID$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ "errors": [ { "errorCode": "auth_factor_mismatch", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Face biometric with NonAuth and valid details UIN, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:259)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:89)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_BioAuth_Biometric_LeftIris_With_Vid_NonAuth_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_NonAuth_LeftIris_Vid_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_NonAuth_LeftIris_Vid_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual2_VID_Valid_Smoke_sid_vid$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Left", "bioType": "Iris", "bioValue": "$LEFTIRIS$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Iris", "transactionId": "$TRANSACTIONID$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ "errors": [ { "errorCode": "auth_factor_mismatch", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=LeftIris biometric with NonAuth VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:259)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:89)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_BioAuth_Biometric_LeftIris_With_uin_NonAuth_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_NonAuth_LeftIris_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_NonAuth_LeftIris_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_BioAuth_smoke_Pos_UIN$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Left", "bioType": "Iris", "bioValue": "$LEFTIRIS$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Iris", "transactionId": "$TRANSACTIONID$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ "errors": [ { "errorCode": "auth_factor_mismatch", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=LeftIris biometric with NonAuth UIN, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:259)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:89)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_BioAuth_Biometric_LeftLittleFinger_With_Vid_NonAuth_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_NonAuth_LeftLittleFinger_Vid_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_NonAuth_LeftLittleFinger_Vid_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual2_VID_Valid_Smoke_sid_vid$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Left LittleFinger", "bioType": "Finger", "bioValue": "$LEFTLITTLEFINGER$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Finger", "transactionId": "$TRANSACTIONID$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ "errors": [ { "errorCode": "auth_factor_mismatch", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=LeftLittleFinger biometric with NonAuth VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:259)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:89)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_BioAuth_Biometric_LeftLittleFinger_With_uin_NonAuth_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_NonAuth_LeftLittleFinger_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_NonAuth_LeftLittleFinger_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_BioAuth_smoke_Pos_UIN$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Left LittleFinger", "bioType": "Finger", "bioValue": "$LEFTLITTLEFINGER$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Finger", "transactionId": "$TRANSACTIONID$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ "errors": [ { "errorCode": "auth_factor_mismatch", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=LeftLittleFinger biometric with NonAuth UIN, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:259)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:89)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_BioAuth_Biometric_LeftMiddleFingerr_With_Vid_NonAuth_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_NonAuth_LeftMiddleFingerr_Vid_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_NonAuth_LeftMiddleFingerr_Vid_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual2_VID_Valid_Smoke_sid_vid$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Left MiddleFinger", "bioType": "Finger", "bioValue": "$LEFTMIDDLEFINGER$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Finger", "transactionId": "$TRANSACTIONID$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ "errors": [ { "errorCode": "auth_factor_mismatch", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=LeftMiddleFinger biometric with NonAuth VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:259)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:89)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_BioAuth_Biometric_LeftMiddleFingerr_With_uin_NonAuth_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_NonAuth_LeftMiddleFingerr_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_NonAuth_LeftMiddleFingerr_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_BioAuth_smoke_Pos_UIN$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Left MiddleFinger", "bioType": "Finger", "bioValue": "$LEFTMIDDLEFINGER$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Finger", "transactionId": "$TRANSACTIONID$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ "errors": [ { "errorCode": "auth_factor_mismatch", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=LeftMiddleFinger biometric with NonAuth UIN, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:259)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:89)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_BioAuth_Biometric_LeftThumb_With_Vid_NonAuth_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_NonAuth_LeftThumb_Vid_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_NonAuth_LeftThumb_Vid_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual2_VID_Valid_Smoke_sid_vid$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Left Thumb", "bioType": "Finger", "bioValue": "$LEFTTHUMB$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Finger", "transactionId": "$TRANSACTIONID$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ "errors": [ { "errorCode": "auth_factor_mismatch", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=LeftThumb biometric with NonAuth VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:259)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:89)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_BioAuth_Biometric_LeftThumb_With_uin_NonAuth_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_NonAuth_LeftThumb_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_NonAuth_LeftThumb_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_BioAuth_smoke_Pos_UIN$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Left Thumb", "bioType": "Finger", "bioValue": "$LEFTTHUMB$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Finger", "transactionId": "$TRANSACTIONID$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ "errors": [ { "errorCode": "auth_factor_mismatch", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=LeftThumb biometric with NonAuth UIN, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:259)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:89)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_BioAuth_Biometric_RightIndexFinger_With_Vid_NonAuth_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_NonAuth_RightIndexFinger_Vid_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_NonAuth_RightIndexFinger_Vid_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual2_VID_Valid_Smoke_sid_vid$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Right IndexFinger", "bioType": "Finger", "bioValue": "$RIGHTINDEXFINGER$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Finger", "transactionId": "$TRANSACTIONID$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ "errors": [ { "errorCode": "auth_factor_mismatch", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=RightIndexFinger biometric with NonAuth VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:259)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:89)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_BioAuth_Biometric_RightIndexFinger_With_uin_NonAuth_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_NonAuth_RightIndexFinger_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_NonAuth_RightIndexFinger_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_BioAuth_smoke_Pos_UIN$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Right IndexFinger", "bioType": "Finger", "bioValue": "$RIGHTINDEXFINGER$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Finger", "transactionId": "$TRANSACTIONID$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ "errors": [ { "errorCode": "auth_factor_mismatch", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=RightIndexFinger biometric with NonAuth UIN, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:259)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:89)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_BioAuth_Biometric_RightIris_With_Vid_NonAuth_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_NonAuth_RightIris_Vid_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_NonAuth_RightIris_Vid_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual2_VID_Valid_Smoke_sid_vid$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Right", "bioType": "Iris", "bioValue": "$RIGHTIRIS$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Iris", "transactionId": "$TRANSACTIONID$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ "errors": [ { "errorCode": "auth_factor_mismatch", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=RightIris biometric with NonAuth VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:259)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:89)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_BioAuth_Biometric_RightIris_With_uin_NonAuth_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_NonAuth_RightIris_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_NonAuth_RightIris_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_BioAuth_smoke_Pos_UIN$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Right", "bioType": "Iris", "bioValue": "$RIGHTIRIS$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Iris", "transactionId": "$TRANSACTIONID$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ "errors": [ { "errorCode": "auth_factor_mismatch", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=RightIris biometric with NonAuth UIN, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:259)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:89)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_BioAuth_Biometric_RightLittleFinger_With_Vid_NonAuth_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_NonAuth_RightLittleFinger_Vid_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_NonAuth_RightLittleFinger_Vid_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual2_VID_Valid_Smoke_sid_vid$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Right LittleFinger", "bioType": "Finger", "bioValue": "$RIGHTLITTLEFINGER$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Finger", "transactionId": "$TRANSACTIONID$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ "errors": [ { "errorCode": "auth_factor_mismatch", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=RightLittleFinger biometric with NonAuth VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:259)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:89)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_BioAuth_Biometric_RightLittleFinger_With_uin_NonAuth_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_NonAuth_RightLittleFinger_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_NonAuth_RightLittleFinger_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_BioAuth_smoke_Pos_UIN$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Right LittleFinger", "bioType": "Finger", "bioValue": "$RIGHTLITTLEFINGER$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Finger", "transactionId": "$TRANSACTIONID$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ "errors": [ { "errorCode": "auth_factor_mismatch", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=RightLittleFinger biometric with NonAuth UIN, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:259)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:89)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_BioAuth_Biometric_RightMiddleFinger_With_Vid_NonAuth_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_NonAuth_RightMiddleFinger_Vid_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_NonAuth_RightMiddleFinger_Vid_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual2_VID_Valid_Smoke_sid_vid$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Right MiddleFinger", "bioType": "Finger", "bioValue": "$RIGHTMIDDLEFINGER$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Finger", "transactionId": "$TRANSACTIONID$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ "errors": [ { "errorCode": "auth_factor_mismatch", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=RightMiddleFinger biometric with NonAuth VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:259)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:89)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_BioAuth_Biometric_RightMiddleFinger_With_uin_NonAuth_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_NonAuth_RightMiddleFinger_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_NonAuth_RightMiddleFinger_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_BioAuth_smoke_Pos_UIN$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Right MiddleFinger", "bioType": "Finger", "bioValue": "$RIGHTMIDDLEFINGER$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Finger", "transactionId": "$TRANSACTIONID$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ "errors": [ { "errorCode": "auth_factor_mismatch", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=RightMiddleFinger biometric with NonAuth UIN, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:259)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:89)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_BioAuth_Biometric_RightRingFinger_With_Vid_NonAuth_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_NonAuth_RightRingFinger_Vid_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_NonAuth_RightRingFinger_Vid_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual2_VID_Valid_Smoke_sid_vid$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Right RingFinger", "bioType": "Finger", "bioValue": "$RIGHTRINGFINGER$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Finger", "transactionId": "$TRANSACTIONID$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ "errors": [ { "errorCode": "auth_factor_mismatch", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=RightRingFinger biometric with NonAuth VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:259)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:89)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_BioAuth_Biometric_RightRingFinger_With_uin_NonAuth_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_NonAuth_RightRingFinger_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_NonAuth_RightRingFinger_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_BioAuth_smoke_Pos_UIN$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Right RingFinger", "bioType": "Finger", "bioValue": "$RIGHTRINGFINGER$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Finger", "transactionId": "$TRANSACTIONID$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ "errors": [ { "errorCode": "auth_factor_mismatch", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=RightRingFinger biometric with NonAuth UIN, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:259)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:89)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_BioAuth_Biometric_RightThumb_With_Vid_NonAuth_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_NonAuth_RightThumb_Vid_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_NonAuth_RightThumb_Vid_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual2_VID_Valid_Smoke_sid_vid$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Right Thumb", "bioType": "Finger", "bioValue": "$RIGHTTHUMB$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Finger", "transactionId": "$TRANSACTIONID$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ "errors": [ { "errorCode": "auth_factor_mismatch", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=RightThumb biometric with NonAuth VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:259)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:89)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_BioAuth_Biometric_RightThumb_With_uin_NonAuth_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_NonAuth_RightThumb_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_NonAuth_RightThumb_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_BioAuth_smoke_Pos_UIN$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Right Thumb", "bioType": "Finger", "bioValue": "$RIGHTTHUMB$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Finger", "transactionId": "$TRANSACTIONID$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ "errors": [ { "errorCode": "auth_factor_mismatch", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=RightThumb biometric with NonAuth UIN, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:259)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:89)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_BioAuth_Biometric_RingFinger_With_Vid_NonAuth_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_NonAuth_RingFinger_Vid_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_NonAuth_RingFinger_Vid_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual2_VID_Valid_Smoke_sid_vid$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Left RingFinger", "bioType": "Finger", "bioValue": "$LEFTRINGFINGER$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Finger", "transactionId": "$TRANSACTIONID$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ "errors": [ { "errorCode": "auth_factor_mismatch", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=RingFinger biometric with NonAuth VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:259)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:89)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_BioAuth_Biometric_RingFinger_With_uin_NonAuth_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_NonAuth_RingFinger_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_NonAuth_RingFinger_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_BioAuth_smoke_Pos_UIN$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Left RingFinger", "bioType": "Finger", "bioValue": "$LEFTRINGFINGER$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Finger", "transactionId": "$TRANSACTIONID$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ "errors": [ { "errorCode": "auth_factor_mismatch", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=RingFinger biometric with NonAuth UIN, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:259)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:89)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_BioNonAuth_Biometric_Face_NonAuth_With_Valid_Vid_Smoke_Pos, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_NonAuth_BioFace_Vid_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_NonAuth_BioFace_Vid_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual2_VID_Valid_Smoke_sid_vid$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "UNKNOWN", "bioType": "FACE", "bioValue": "$FACE$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "1873299273", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Full face", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467171", "type": "Face", "transactionId": "$TRANSACTIONID$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ "errors": [ { "errorCode": "auth_factor_mismatch", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Face biometric with NonAuth and valid details VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:106)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_NonAuth_Otp_Vid_Valid_Smoke, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_NonAuth_Otp_Vid_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_NonAuth_Otp_Vid_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Vid_Generation_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_NonAuth_Otp_Vid_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_NonAuth_Otp_Vid_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "auth_factor_mismatch", "errorMessage": "auth_factor_mismatch" } ], "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Authenticate User with NonAuth Otp with valid details VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:98)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_NonAuth_uin_Otp_Valid_Smoke, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_NonAuth_Otp_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_NonAuth_Otp_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Parameters_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Valid_Parameters_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_NonAuth_Otp_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_NonAuth_Otp_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Parameters_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "auth_factor_mismatch", "errorMessage": "auth_factor_mismatch" } ], "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Authenticate User with NonAuth Otp with valid details UIN, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:259)
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:88)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Consent_Vid_Claim2_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/Consent/OAuthDetailsRequestConsent/OAuthDetailsRequestConsentNewClaim, outputTemplate=esignet/Consent/OAuthDetailsRequestConsent/OAuthDetailsRequestConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request for consent with claim2 and all valid details VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:99)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Consent_Vid_User2_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_Misp_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/Consent/OAuthDetailsRequestConsent/OAuthDetailsRequestConsent, outputTemplate=esignet/Consent/OAuthDetailsRequestConsent/OAuthDetailsRequestConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request for user2 with all valid details VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:99)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Consent_Vid_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/Consent/OAuthDetailsRequestConsent/OAuthDetailsRequestConsent, outputTemplate=esignet/Consent/OAuthDetailsRequestConsent/OAuthDetailsRequestConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request for consent with all valid details VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:99)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Consent_Claim2_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/Consent/OAuthDetailsRequestConsent/OAuthDetailsRequestConsentNewClaim, outputTemplate=esignet/Consent/OAuthDetailsRequestConsent/OAuthDetailsRequestConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request for consent with claim2 and all valid details, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Consent_Invalid_Scen_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/Consent/OAuthDetailsRequestConsent/OAuthDetailsRequestConsent, outputTemplate=esignet/Consent/OAuthDetailsRequestConsent/OAuthDetailsRequestConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request for consent with invalid scen, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Consent_User2_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_Misp_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/Consent/OAuthDetailsRequestConsent/OAuthDetailsRequestConsent, outputTemplate=esignet/Consent/OAuthDetailsRequestConsent/OAuthDetailsRequestConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request for user2 with all valid details, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Consent_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/Consent/OAuthDetailsRequestConsent/OAuthDetailsRequestConsent, outputTemplate=esignet/Consent/OAuthDetailsRequestConsent/OAuthDetailsRequestConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request for consent with all valid details, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_Consent_Vid_Otp_Claim2_Valid_Smoke, endPoint=/v1/esignet/authorization/v2/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Consent_Vid_Claim2_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Consent_Vid_Claim2_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Consent_Valid_Smoke_sid_vid$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Consent_Vid_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Consent_Vid_Claim2_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Consent_Vid_Claim2_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Consent_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "consentAction": "CAPTURE", "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/Consent/AuthenticateUserConsent/AuthenticateUserConsent, outputTemplate=esignet/Consent/AuthenticateUserConsent/AuthenticateUserConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Authenticate user consent with otp for claim2 valid details VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:98)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_Consent_Vid_Otp_Invalid_IndividualId_Neg, endPoint=/v1/esignet/authorization/v2/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Consent_Invalid_Scen_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Consent_Invalid_Scen_Smoke_sid_transactionId$", "individualId": "sdfsdfsdf", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Consent_Vid_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Consent_Invalid_Scen_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Consent_Invalid_Scen_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Consent_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "IDA-MLC-009", "errorMessage": "$IGNORE$" } ], "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/Consent/AuthenticateUserConsent/AuthenticateUserConsent, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Authenticate user consent Otp with invalid individualId VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:98)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_Consent_Vid_Otp_Invalid_TransactionId_Neg, endPoint=/v1/esignet/authorization/v2/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Consent_Invalid_Scen_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "skdfsjkdfbk", "individualId": "$ID:Generate_Perpetual_VID_Consent_Valid_Smoke_sid_vid$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Consent_Vid_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Consent_Invalid_Scen_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Consent_Invalid_Scen_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Consent_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_transaction", "errorMessage": "$IGNORE$" } ], "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/Consent/AuthenticateUserConsent/AuthenticateUserConsent, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Authenticate user consent Otp with invalid transactionId VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:98)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_Consent_Vid_Otp_Valid_Smoke, endPoint=/v1/esignet/authorization/v2/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Consent_Vid_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Consent_Vid_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Consent_Valid_Smoke_sid_vid$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Consent_Vid_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Consent_Vid_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Consent_Vid_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Consent_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "consentAction": "CAPTURE", "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/Consent/AuthenticateUserConsent/AuthenticateUserConsent, outputTemplate=esignet/Consent/AuthenticateUserConsent/AuthenticateUserConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Authenticate user consent with otp and valid details VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:98)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_Consent_Vid_User2_Otp_Valid_Smoke, endPoint=/v1/esignet/authorization/v2/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Consent_Vid_User2_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Consent_Vid_User2_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Consent_Valid_Smoke_sid_vid$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Consent_Vid_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Consent_Vid_User2_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Consent_Vid_User2_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Consent_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "consentAction": "CAPTURE", "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/Consent/AuthenticateUserConsent/AuthenticateUserConsent, outputTemplate=esignet/Consent/AuthenticateUserConsent/AuthenticateUserConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Authenticate user consent Otp for User2 with valid details UIN, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:98)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_Consent_uin_Otp_Claim2_Valid_Smoke, endPoint=/v1/esignet/authorization/v2/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Consent_Claim2_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Consent_Claim2_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Consent_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Consent_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Consent_Claim2_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Consent_Claim2_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Consent_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "consentAction": "CAPTURE", "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/Consent/AuthenticateUserConsent/AuthenticateUserConsent, outputTemplate=esignet/Consent/AuthenticateUserConsent/AuthenticateUserConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Authenticate user consent with otp for claim2 valid details UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_Consent_uin_Otp_Invalid_IndividualId_Neg, endPoint=/v1/esignet/authorization/v2/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Consent_Invalid_Scen_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Consent_Invalid_Scen_Smoke_sid_transactionId$", "individualId": "jndjksgl", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Consent_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Consent_Invalid_Scen_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Consent_Invalid_Scen_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Consent_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "IDA-MLC-009", "errorMessage": "$IGNORE$" } ], "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/Consent/AuthenticateUserConsent/AuthenticateUserConsent, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=IDA-MLC-009,invalid_individual_id,, kycFields=null, description=Authenticate user consent Otp with invalid individualId UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_Consent_uin_Otp_Invalid_TransactionId_Neg, endPoint=/v1/esignet/authorization/v2/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Consent_Invalid_Scen_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "skdfsjkdfbk", "individualId": "$ID:AddIdentity_Consent_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Consent_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Consent_Invalid_Scen_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Consent_Invalid_Scen_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Consent_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_transaction", "errorMessage": "$IGNORE$" } ], "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/Consent/AuthenticateUserConsent/AuthenticateUserConsent, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Authenticate user consent Otp with invalid transactionId UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_Consent_uin_Otp_Valid_Smoke, endPoint=/v1/esignet/authorization/v2/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Consent_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Consent_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Consent_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Consent_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Consent_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Consent_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Consent_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "consentAction": "CAPTURE", "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/Consent/AuthenticateUserConsent/AuthenticateUserConsent, outputTemplate=esignet/Consent/AuthenticateUserConsent/AuthenticateUserConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Authenticate user consent with otp and valid details UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_Consent_uin_User2_Otp_Valid_Smoke, endPoint=/v1/esignet/authorization/v2/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Consent_User2_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Consent_User2_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Consent_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Consent_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Consent_User2_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Consent_User2_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Consent_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "consentAction": "CAPTURE", "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/Consent/AuthenticateUserConsent/AuthenticateUserConsent, outputTemplate=esignet/Consent/AuthenticateUserConsent/AuthenticateUserConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Authenticate user consent Otp for User2 with valid details UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_Consent_Vid_All_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Consent_Vid_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Consent_Vid_all_Valid_Smoke_sid_transactionId$", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}] }, output={ "redirectUri": "$IGNORE$" }, inputTemplate=esignet/Consent/AuthorizationCodeConsent/AuthorizationCodeConsent, outputTemplate=esignet/Consent/AuthorizationCodeConsent/AuthorizationCodeConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=AuthorizationCode consent with all valid details VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:99)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_Consent_Vid_Claim2_All_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Consent_Vid_Claim2_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Consent_Vid_Claim2_all_Valid_Smoke_sid_transactionId$", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}] }, output={ "redirectUri": "$IGNORE$" }, inputTemplate=esignet/Consent/AuthorizationCodeConsent/AuthorizationCodeConsent, outputTemplate=esignet/Consent/AuthorizationCodeConsent/AuthorizationCodeConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=AuthorizationCode consent with claim2 and all valid details VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:99)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_Consent_uin_All_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Consent_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Consent_all_Valid_Smoke_sid_transactionId$", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}] }, output={ "redirectUri": "$IGNORE$" }, inputTemplate=esignet/Consent/AuthorizationCodeConsent/AuthorizationCodeConsent, outputTemplate=esignet/Consent/AuthorizationCodeConsent/AuthorizationCodeConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=AuthorizationCode consent with all valid details UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_Consent_uin_Claim2_All_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Consent_Claim2_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Consent_Claim2_all_Valid_Smoke_sid_transactionId$", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}] }, output={ "redirectUri": "$IGNORE$" }, inputTemplate=esignet/Consent/AuthorizationCodeConsent/AuthorizationCodeConsent, outputTemplate=esignet/Consent/AuthorizationCodeConsent/AuthorizationCodeConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=AuthorizationCode consent with claim2 and all valid details UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_Consent_Vid_Claim2_Valid_Smoke_sid, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_Consent_Vid_Claim2_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "token_type": "Bearer" }, inputTemplate=esignet/Consent/GenerateTokenConsent/GenerateTokenConsent, outputTemplate=esignet/Consent/GenerateTokenConsent/GenerateTokenConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token consent with claim2 and valid details VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:101)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_Consent_Vid_Valid_Smoke_sid, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_Consent_Vid_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "token_type": "Bearer" }, inputTemplate=esignet/Consent/GenerateTokenConsent/GenerateTokenConsent, outputTemplate=esignet/Consent/GenerateTokenConsent/GenerateTokenConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token consent with valid details VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:101)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_Consent_uin_Claim2_Valid_Smoke_sid, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_Consent_uin_Claim2_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "token_type": "Bearer" }, inputTemplate=esignet/Consent/GenerateTokenConsent/GenerateTokenConsent, outputTemplate=esignet/Consent/GenerateTokenConsent/GenerateTokenConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token consent with claim2 and valid details UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_Consent_uin_Valid_Smoke_sid, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_Consent_uin_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "token_type": "Bearer" }, inputTemplate=esignet/Consent/GenerateTokenConsent/GenerateTokenConsent, outputTemplate=esignet/Consent/GenerateTokenConsent/GenerateTokenConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token consent with valid details UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetOidcUserInfo_Consent_Vid_IdpAccessToken_StatusCode_Claim2_Valid_Smoke_sid, endPoint=/v1/esignet/oidc/userinfo, role=resident, templateFields=null, input={ "idpAccessToken": "$ID:GenerateToken_Consent_Vid_Claim2_Valid_Smoke_sid_access_token$" }, output=200, inputTemplate=esignet/Consent/GetOidcUserInfoConsent/GetOidcUserInfoConsent, outputTemplate=esignet/Consent/GetOidcUserInfoConsent/GetOidcUserInfoConsentResult, restMethod=get, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get OIDC user info consent with claim2 and valid details VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.GetWithParam.test(GetWithParam.java:95)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_GetOidcUserInfo_Consent_Vid_IdpAccessToken_StatusCode_Valid_Smoke_sid, endPoint=/v1/esignet/oidc/userinfo, role=resident, templateFields=null, input={ "idpAccessToken": "$ID:GenerateToken_Consent_Vid_Valid_Smoke_sid_access_token$" }, output=200, inputTemplate=esignet/Consent/GetOidcUserInfoConsent/GetOidcUserInfoConsent, outputTemplate=esignet/Consent/GetOidcUserInfoConsent/GetOidcUserInfoConsentResult, restMethod=get, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get OIDC user info consent with all valid details VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.GetWithParam.test(GetWithParam.java:95)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_GetOidcUserInfo_Consent_uin_IdpAccessToken_StatusCode_Claim2_Valid_Smoke_sid, endPoint=/v1/esignet/oidc/userinfo, role=resident, templateFields=null, input={ "idpAccessToken": "$ID:GenerateToken_Consent_uin_Claim2_Valid_Smoke_sid_access_token$" }, output=200, inputTemplate=esignet/Consent/GetOidcUserInfoConsent/GetOidcUserInfoConsent, outputTemplate=esignet/Consent/GetOidcUserInfoConsent/GetOidcUserInfoConsentResult, restMethod=get, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get OIDC user info consent with claim2 and valid details UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetOidcUserInfo_Consent_uin_IdpAccessToken_StatusCode_Valid_Smoke_sid, endPoint=/v1/esignet/oidc/userinfo, role=resident, templateFields=null, input={ "idpAccessToken": "$ID:GenerateToken_Consent_uin_Valid_Smoke_sid_access_token$" }, output=200, inputTemplate=esignet/Consent/GetOidcUserInfoConsent/GetOidcUserInfoConsent, outputTemplate=esignet/Consent/GetOidcUserInfoConsent/GetOidcUserInfoConsentResult, restMethod=get, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get OIDC user info consent with all valid details UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Consent_Vid_2nd_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/Consent/OAuthDetailsRequestConsent/OAuthDetailsRequestConsent, outputTemplate=esignet/Consent/OAuthDetailsRequestConsent/OAuthDetailsRequestConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request consent 2nd with all valid details VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:99)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_SendOtp_Vid_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request sendOtp with all valid details VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:99)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Vid_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with all valid details VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:99)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_10all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request 10 with all valid details, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_11all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request 11 with all valid details, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_12all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request 12 with all valid details, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_13all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request 13 with all valid details, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_14all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request 14 with all valid details, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_15all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request 15 with all valid details, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_16all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request 16 with all valid details, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_17all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request 17 with all valid details, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_18all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request 18 with all valid details, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_19all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request 19 with all valid details, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_20all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request 20 with all valid details, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_21all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request 21 with all valid details, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_22all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request 22 with all valid details, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_23all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request 23 with all valid details, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_24all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request 24 with all valid details, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_25all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request 25 with all valid details, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_2_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request 2 with all valid details, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_2all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request 2 with all valid details, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_2nd_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request 2nd with all valid details, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_2nd_vid_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request 2nd with all valid details VID, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_3all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request 3 with all valid details, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_4all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request 4 with all valid details, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_5all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request 5 with all valid details, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_6all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request 6 with all valid details, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_7all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request 7 with all valid details, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_8all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request 8 with all valid details, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_9all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request 9 with all valid details, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Consent_2nd_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/Consent/OAuthDetailsRequestConsent/OAuthDetailsRequestConsent, outputTemplate=esignet/Consent/OAuthDetailsRequestConsent/OAuthDetailsRequestConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request consent 2nd with all valid details, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Diff_requestTime_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "2022-11-07T06:51:30.195Z", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with different requestTime, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Empty_AcrValues_Pos, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with empty value in AcrValues, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Empty_Claims_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en", "claims": "" }, output={ "errors": [ { "errorCode": "unknown_error" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestEmptyClaims, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with empty value in Claims, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Empty_ClientId_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ "errors": [ { "errorCode": "invalid_client_id", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with empty value in ClientId, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Empty_Nonce_Pos, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with empty value in Nonce, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Empty_Prompt_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ "errors": [ { "errorCode": "invalid_prompt" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with empty value in prompt, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Empty_ResponseType_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ "errors": [ { "errorCode": "invalid_response_type", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with empty value in ResponseType, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Empty_Scope_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ "errors": [ { "errorCode": "invalid_scope", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with empty value in Scope, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Empty_State_Pos, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with empty value in state, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Empty_claimsLocales_Pos, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with empty value in claimsLocales, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Empty_display_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ "errors": [ { "errorCode": "invalid_display" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with empty value in display, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Empty_redirectUri_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ "errors": [ { "errorCode": "invalid_redirect_uri", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with empty value in redirectUri, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Exceding_Range_ClientId_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "vc0neervbsu10dfbo2vu282lt0r9hf044b1q8wm957k97wpjmrmwz6kcbpv5p9zyocksfyg41u4rpm71hhqy29sqcixg1i0ed2aaxlfd9f5wtpf3py2igi3orhttvh6vqys16nmnke9qwjjr8byjflotzyw078t1azc9rvoftuhdis40mgy9uoyzoypwdbomdkjg3v9y216y7bfpiyoenhgaudirgn432u3c2x27z23zvd094m7ug4lvid8av6jhc24j", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ "errors": [ { "errorCode": "invalid_client_id", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with exceeding range in ClientId, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Exceding_Range_State_Pos, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "aa1hmnkz7ee0c1te988gw9bkos5pb4mi830uf6wrxj6hs80z07rmtwpzvjr9qjhgw8aw2rf9iljprvvxxh4y94je13gl4vr9vwaq358tnov5bh3likbef6elkqnqvnn4gu9fh1pzui2b459m0xfwjdsjlinll1s6kayk29d01i3vx1uagewcoc39ssxm4feyci06zoimd6ot3c0w3w8genv1d0hk4ni9ym1mjkwclffj5tfiglipy9sn5fyjqway9c6y", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with exceeding range in state, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Invalid_AcrValues_Pos, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with Invalid AcrValues, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Invalid_Claims_Pos, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestInvalidClaim, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with invalid Claims, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Invalid_ClientId_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "reateOIDCClient_all_Valid_Smoke_sid_cl", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ "errors": [ { "errorCode": "invalid_client_id", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with Invalid ClientId, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Invalid_Format_AcrValues_Pos, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp/acr:static?:code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with Invalid format AcrValues, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Invalid_Prompt_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "abc", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ "errors": [ { "errorCode": "invalid_prompt", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with invalid prompt, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Invalid_Range_ClientId_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": " ", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ "errors": [ { "errorCode": "invalid_client_id", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with Invalid range in ClientId, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Invalid_ResponseType_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "decode", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ "errors": [ { "errorCode": "invalid_response_type", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with Invalid ResponseType, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Invalid_Scope_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "email", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ "errors": [ { "errorCode": "invalid_scope", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with Invalid Scope, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Invalid_State_Pos, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "$$@#fdhfdkl", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with invalid state, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Invalid_claimsLocales_Pos, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "hn" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with invalid claimsLocales, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Invalid_display_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "abc", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ "errors": [ { "errorCode": "invalid_display", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with invalid display, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Invalid_redirectUri_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "https://health-services.com", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ "errors": [ { "errorCode": "invalid_redirect_uri", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with Invalid redirectUri, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Invalid_requestTime_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "2022-11-08T06:35:53", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with invalid requestTime, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Missing_AcrValues_Pos, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "$REMOVE$", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request without AcrValues, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Missing_Claims_Pos, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en", "claims": "$REMOVE$" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestEmptyClaims, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request without Claims, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Missing_ClientId_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$REMOVE$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ "errors": [ { "errorCode": "invalid_client_id", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request without ClientId, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Missing_Nonce_Pos, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$REMOVE$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request without Nonce, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Missing_Prompt_Pos, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "$REMOVE$", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request without prompt, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Missing_ResponseType_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "$REMOVE$", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ "errors": [ { "errorCode": "invalid_response_type", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request without ResponseType, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Missing_Scope_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "$REMOVE$", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ "errors": [ { "errorCode": "invalid_scope", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request without Scope, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Missing_State_Pos, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "$REMOVE$", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request without state, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Missing_claimsLocales_Pos, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "$REMOVE$" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request without claimsLocales, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Missing_display_Pos, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "$REMOVE$", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request without display, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Missing_redirectUri_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$REMOVE$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ "errors": [ { "errorCode": "invalid_redirect_uri", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request without redirectUri, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Null_AcrValues_Pos, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with Null in AcrValues, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Null_Prompt_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "null", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ "errors": [ { "errorCode": "invalid_prompt", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with Null in prompt, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Null_ResponseType_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "decode", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ "errors": [ { "errorCode": "invalid_response_type", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with Null in ResponseType, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Null_Scope_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "null", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ "errors": [ { "errorCode": "invalid_scope", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with Null in Scope, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Null_State_Pos, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "null", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with Null in state, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Null_claimsLocales_Pos, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "null" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with Null in claimsLocales, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Null_display_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "null", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ "errors": [ { "errorCode": "invalid_display", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with Null in display, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Null_redirectUri_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "null", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ "errors": [ { "errorCode": "invalid_redirect_uri", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with Null in redirectUri, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Other_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with other valid details, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_SpaceValue_display_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": " ", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ "errors": [ { "errorCode": "invalid_display" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with space in display, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_WithoutSpace_AcrValues_Pos, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-codemosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request without space in AcrValues, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_WithoutSpace_Scope_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openidemailaddressphone", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ "errors": [ { "errorCode": "invalid_scope", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request without space in Scope, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with all valid details, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_space_delimited_Prompt_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "select account", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ "errors": [ { "errorCode": "invalid_prompt", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with space delimited in prompt, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_vid_Other_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with other valid details VID, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_BioAuth_Biometric_Face_With_Valid_Vid_Smoke_Pos, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_14all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_14all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual2_VID_Valid_Smoke_sid_vid$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "UNKNOWN", "bioType": "FACE", "bioValue": "$FACE$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "1873299273", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Full face", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467171", "type": "Face", "transactionId": "$ID:OAuthDetailsRequest_14all_Valid_Smoke_sid_transactionId$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ "transactionId": "$IGNORE$" }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/BioAuthIdp/bioAuthResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Biometric Face Auth with all valid details VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:259)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:89)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_BioAuth_Biometric_Face_With_Valid_uin_Smoke_Pos, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_13all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_13all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_BioAuth_smoke_Pos_UIN$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "UNKNOWN", "bioType": "FACE", "bioValue": "$FACE$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "1873299273", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Full face", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467171", "type": "Face", "transactionId": "$ID:OAuthDetailsRequest_13all_Valid_Smoke_sid_transactionId$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ "transactionId": "$IGNORE$" }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/BioAuthIdp/bioAuthResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Biometric Face Auth with all valid details UIN, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:259)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:89)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_BioAuth_Biometric_LeftIris_With_Valid_Vid_Smoke_Pos, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_25all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_25all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual2_VID_Valid_Smoke_sid_vid$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Left", "bioType": "Iris", "bioValue": "$LEFTIRIS$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Iris", "transactionId": "$ID:OAuthDetailsRequest_25all_Valid_Smoke_sid_transactionId$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ "transactionId": "$IGNORE$" }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/BioAuthIdp/bioAuthResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Biometric LeftIris Auth with all valid details VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:259)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:89)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_BioAuth_Biometric_LeftIris_With_Valid_uin_Smoke_Pos, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_12all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_12all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_BioAuth_smoke_Pos_UIN$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Left", "bioType": "Iris", "bioValue": "$LEFTIRIS$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Iris", "transactionId": "$ID:OAuthDetailsRequest_12all_Valid_Smoke_sid_transactionId$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ "transactionId": "$IGNORE$" }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/BioAuthIdp/bioAuthResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Biometric LeftIris Auth with all valid details UIN, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:259)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:89)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_BioAuth_Biometric_LeftLittleFinger_With_Valid_Vid_Smoke_Pos, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_17all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_17all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual2_VID_Valid_Smoke_sid_vid$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Left LittleFinger", "bioType": "Finger", "bioValue": "$LEFTLITTLEFINGER$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Finger", "transactionId": "$ID:OAuthDetailsRequest_17all_Valid_Smoke_sid_transactionId$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ "transactionId": "$IGNORE$" }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/BioAuthIdp/bioAuthResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Biometric LeftLittleFinger Auth with all valid details VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:259)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:89)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_BioAuth_Biometric_LeftLittleFinger_With_Valid_uin_Smoke_Pos, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_4all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_4all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_BioAuth_smoke_Pos_UIN$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Left LittleFinger", "bioType": "Finger", "bioValue": "$LEFTLITTLEFINGER$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Finger", "transactionId": "$ID:OAuthDetailsRequest_4all_Valid_Smoke_sid_transactionId$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ "transactionId": "$IGNORE$" }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/BioAuthIdp/bioAuthResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Biometric LeftLittleFinger Auth with all valid details UIN, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:259)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:89)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_BioAuth_Biometric_LeftMiddleFingerr_With_Valid_Vid_Smoke_Pos, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_16all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_16all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual2_VID_Valid_Smoke_sid_vid$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Left MiddleFinger", "bioType": "Finger", "bioValue": "$LEFTMIDDLEFINGER$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Finger", "transactionId": "$ID:OAuthDetailsRequest_16all_Valid_Smoke_sid_transactionId$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ "transactionId": "$IGNORE$" }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/BioAuthIdp/bioAuthResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Biometric LeftMiddleFinger Auth with all valid details VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:259)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:89)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_BioAuth_Biometric_LeftMiddleFingerr_With_Valid_uin_Smoke_Pos, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_3all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_3all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_BioAuth_smoke_Pos_UIN$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Left MiddleFinger", "bioType": "Finger", "bioValue": "$LEFTMIDDLEFINGER$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Finger", "transactionId": "$ID:OAuthDetailsRequest_3all_Valid_Smoke_sid_transactionId$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ "transactionId": "$IGNORE$" }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/BioAuthIdp/bioAuthResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Biometric LeftMiddleFinger Auth with all valid details UIN, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:259)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:89)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_BioAuth_Biometric_LeftThumb_With_Valid_Vid_Smoke_Pos, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_22all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_22all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual2_VID_Valid_Smoke_sid_vid$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Left Thumb", "bioType": "Finger", "bioValue": "$LEFTTHUMB$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Finger", "transactionId": "$ID:OAuthDetailsRequest_22all_Valid_Smoke_sid_transactionId$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ "transactionId": "$IGNORE$" }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/BioAuthIdp/bioAuthResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Biometric LeftThumb Auth with all valid details VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:259)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:89)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_BioAuth_Biometric_LeftThumb_With_Valid_uin_Smoke_Pos, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_9all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_9all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_BioAuth_smoke_Pos_UIN$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Left Thumb", "bioType": "Finger", "bioValue": "$LEFTTHUMB$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Finger", "transactionId": "$ID:OAuthDetailsRequest_9all_Valid_Smoke_sid_transactionId$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ "transactionId": "$IGNORE$" }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/BioAuthIdp/bioAuthResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Biometric LeftThumb Auth with all valid details UIN, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:259)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:89)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_BioAuth_Biometric_RightIndexFinger_With_Valid_Vid_Smoke_Pos, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_18all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_18all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual2_VID_Valid_Smoke_sid_vid$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Right IndexFinger", "bioType": "Finger", "bioValue": "$RIGHTINDEXFINGER$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Finger", "transactionId": "$ID:OAuthDetailsRequest_18all_Valid_Smoke_sid_transactionId$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ "transactionId": "$IGNORE$" }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/BioAuthIdp/bioAuthResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Biometric RightIndexFinger Auth with all valid details VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:259)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:89)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_BioAuth_Biometric_RightIndexFinger_With_Valid_uin_Smoke_Pos, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_5all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_5all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_BioAuth_smoke_Pos_UIN$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Right IndexFinger", "bioType": "Finger", "bioValue": "$RIGHTINDEXFINGER$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Finger", "transactionId": "$ID:OAuthDetailsRequest_5all_Valid_Smoke_sid_transactionId$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ "transactionId": "$IGNORE$" }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/BioAuthIdp/bioAuthResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Biometric RightIndexFinger Auth with all valid details UIN, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:259)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:89)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_BioAuth_Biometric_RightIris_With_Valid_Vid_Smoke_Pos, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_24all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_24all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual2_VID_Valid_Smoke_sid_vid$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Right", "bioType": "Iris", "bioValue": "$RIGHTIRIS$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Iris", "transactionId": "$ID:OAuthDetailsRequest_24all_Valid_Smoke_sid_transactionId$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ "transactionId": "$IGNORE$" }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/BioAuthIdp/bioAuthResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Biometric RightIris Auth with all valid details VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:259)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:89)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_BioAuth_Biometric_RightIris_With_Valid_uin_Smoke_Pos, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_11all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_11all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_BioAuth_smoke_Pos_UIN$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Right", "bioType": "Iris", "bioValue": "$RIGHTIRIS$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Iris", "transactionId": "$ID:OAuthDetailsRequest_11all_Valid_Smoke_sid_transactionId$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ "transactionId": "$IGNORE$" }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/BioAuthIdp/bioAuthResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Biometric RightIris Auth with all valid details UIN, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:259)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:89)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_BioAuth_Biometric_RightLittleFinger_With_Valid_Vid_Smoke_Pos, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_21all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_21all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual2_VID_Valid_Smoke_sid_vid$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Right LittleFinger", "bioType": "Finger", "bioValue": "$RIGHTLITTLEFINGER$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Finger", "transactionId": "$ID:OAuthDetailsRequest_21all_Valid_Smoke_sid_transactionId$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ "transactionId": "$IGNORE$" }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/BioAuthIdp/bioAuthResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Biometric RightLittleFinger Auth with all valid details VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:259)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:89)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_BioAuth_Biometric_RightLittleFinger_With_Valid_uin_Smoke_Pos, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_8all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_8all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_BioAuth_smoke_Pos_UIN$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Right LittleFinger", "bioType": "Finger", "bioValue": "$RIGHTLITTLEFINGER$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Finger", "transactionId": "$ID:OAuthDetailsRequest_8all_Valid_Smoke_sid_transactionId$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ "transactionId": "$IGNORE$" }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/BioAuthIdp/bioAuthResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Biometric RightLittleFinger Auth with all valid details UIN, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:259)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:89)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_BioAuth_Biometric_RightMiddleFinger_With_Valid_Vid_Smoke_Pos, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_20all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_20all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual2_VID_Valid_Smoke_sid_vid$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Right MiddleFinger", "bioType": "Finger", "bioValue": "$RIGHTMIDDLEFINGER$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Finger", "transactionId": "$ID:OAuthDetailsRequest_20all_Valid_Smoke_sid_transactionId$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ "transactionId": "$IGNORE$" }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/BioAuthIdp/bioAuthResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Biometric RightMiddleFinger Auth with all valid details VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:259)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:89)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_BioAuth_Biometric_RightMiddleFinger_With_Valid_uin_Smoke_Pos, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_7all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_7all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_BioAuth_smoke_Pos_UIN$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Right MiddleFinger", "bioType": "Finger", "bioValue": "$RIGHTMIDDLEFINGER$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Finger", "transactionId": "$ID:OAuthDetailsRequest_7all_Valid_Smoke_sid_transactionId$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ "transactionId": "$IGNORE$" }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/BioAuthIdp/bioAuthResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Biometric RightMiddleFinger Auth with all valid details UIN, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:259)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:89)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_BioAuth_Biometric_RightRingFinger_With_Valid_Vid_Smoke_Pos, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_19all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_19all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual2_VID_Valid_Smoke_sid_vid$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Right RingFinger", "bioType": "Finger", "bioValue": "$RIGHTRINGFINGER$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Finger", "transactionId": "$ID:OAuthDetailsRequest_19all_Valid_Smoke_sid_transactionId$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ "transactionId": "$IGNORE$" }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/BioAuthIdp/bioAuthResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Biometric RightRingFinger Auth with all valid details VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:259)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:89)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_BioAuth_Biometric_RightRingFinger_With_Valid_uin_Smoke_Pos, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_6all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_6all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_BioAuth_smoke_Pos_UIN$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Right RingFinger", "bioType": "Finger", "bioValue": "$RIGHTRINGFINGER$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Finger", "transactionId": "$ID:OAuthDetailsRequest_6all_Valid_Smoke_sid_transactionId$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ "transactionId": "$IGNORE$" }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/BioAuthIdp/bioAuthResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Biometric RightRingFinger Auth with all valid details UIN, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:259)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:89)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_BioAuth_Biometric_RightThumb_With_Valid_Vid_Smoke_Pos, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_23all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_23all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual2_VID_Valid_Smoke_sid_vid$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Right Thumb", "bioType": "Finger", "bioValue": "$RIGHTTHUMB$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Finger", "transactionId": "$ID:OAuthDetailsRequest_23all_Valid_Smoke_sid_transactionId$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ "transactionId": "$IGNORE$" }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/BioAuthIdp/bioAuthResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Biometric RightThumb Auth with all valid details VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:259)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:89)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_BioAuth_Biometric_RightThumb_With_Valid_uin_Smoke_Pos, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_10all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_10all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_BioAuth_smoke_Pos_UIN$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Right Thumb", "bioType": "Finger", "bioValue": "$RIGHTTHUMB$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Finger", "transactionId": "$ID:OAuthDetailsRequest_10all_Valid_Smoke_sid_transactionId$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ "transactionId": "$IGNORE$" }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/BioAuthIdp/bioAuthResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Biometric RightThumb Auth with all valid details UIN, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:259)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:89)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_BioAuth_Biometric_RingFinger_With_Valid_Vid_Smoke_Pos, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_15all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_15all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual2_VID_Valid_Smoke_sid_vid$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Left RingFinger", "bioType": "Finger", "bioValue": "$LEFTRINGFINGER$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Finger", "transactionId": "$ID:OAuthDetailsRequest_15all_Valid_Smoke_sid_transactionId$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ "transactionId": "$IGNORE$" }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/BioAuthIdp/bioAuthResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Biometric RingFinger Auth with all valid details VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:259)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:89)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_BioAuth_Biometric_RingFinger_With_Valid_uin_Smoke_Pos, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_2all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_2all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_BioAuth_smoke_Pos_UIN$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Left RingFinger", "bioType": "Finger", "bioValue": "$LEFTRINGFINGER$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Finger", "transactionId": "$ID:OAuthDetailsRequest_2all_Valid_Smoke_sid_transactionId$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ "transactionId": "$IGNORE$" }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/BioAuthIdp/bioAuthResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Biometric RingFinger Auth with all valid details UIN, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:259)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:89)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_SendOtp_Vid_Diff_RequestTime_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "2022-11-07T06:51:30.195Z", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=SendOtp with different requestTime VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:97)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_SendOtp_Vid_Empty_OtpChannel_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "otpChannels": "" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendOtp/SendOtpEmptyOtpChannel, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=SendOtp with empty value in OtpChannels VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:97)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_SendOtp_Vid_Empty_OtpChannels_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "otpChannels": [{channel: ""},{channel: ""}] }, output={ "errors": [ { "errorCode": "invalid_otp_channel", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=SendOtp with empty value in OtpChannels VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:97)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_SendOtp_Vid_Empty_individualId_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "individualId": "", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "invalid_identifier", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=SendOtp with empty value in individualId VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:97)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_SendOtp_Vid_Empty_transactionId_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "invalid_transaction", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=SendOtp with empty value in transactionId VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:97)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_SendOtp_Vid_Expired_transactionId_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "4eKDB4GPk6fP8XXEDY7rktwtQF6WiwrOCehT2CwyVT0", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "invalid_transaction", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=SendOtp with expired transactionId VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:97)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_SendOtp_Vid_Future_RequestTime_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "2033-11-07T06:51:30.195Z", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=SendOtp with future requestTime VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:97)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_SendOtp_Vid_Invalid_OtpChannels_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "Random1"},{channel: "Random2"}] }, output={ "errors": [ { "errorCode": "invalid_otp_channel", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=SendOtp with invalid OtpChannels VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:97)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_SendOtp_Vid_Invalid_RequestTime_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "2022-11-08T06:35:53", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=SendOtp with invalid requestTime VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:97)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_SendOtp_Vid_Invalid_individualId_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "@@#$#VGH", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "IDA-MLC-009", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=SendOtp with invalid individualId VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:97)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_SendOtp_Vid_Invalid_transactionId_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "transactionId", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "invalid_transaction", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=SendOtp with invalid transactionId VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:97)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_SendOtp_Vid_Missing_OtpChannel_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "otpChannels": "$REMOVE$" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendOtp/SendOtpEmptyOtpChannel, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=SendOtp without OtpChannels VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:97)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_SendOtp_Vid_Missing_OtpChannels_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "$REMOVE$"},{channel: "$REMOVE$"}] }, output={ "errors": [ { "errorCode": "invalid_otp_channel", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=SendOtp without OtpChannels VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:97)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_SendOtp_Vid_Missing_individualId_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "individualId": "$REMOVE$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "invalid_identifier", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=SendOtp without individualId VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:97)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_SendOtp_Vid_Missing_transactionId_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$REMOVE$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "invalid_transaction", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=SendOtp without transactionId VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:97)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_SendOtp_Vid_Null_OtpChannel_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "otpChannels": "null" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendOtp/SendOtpEmptyOtpChannel, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=SendOtp with Null in OtpChannels VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:97)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_SendOtp_Vid_Null_OtpChannels_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "null"},{channel: "null"}] }, output={ "errors": [ { "errorCode": "invalid_otp_channel", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=SendOtp with Null in OtpChannels VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:97)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_SendOtp_Vid_Null_individualId_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "null", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "IDA-MLC-009", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=SendOtp with Null in individualId VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:97)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_SendOtp_Vid_Null_transactionId_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "null", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "invalid_transaction", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=SendOtp with Null in transactionId VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:97)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_SendOtp_Vid_SpaceSeparated_otpChannels_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "s m s"}] }, output={ "errors": [ { "errorCode": "invalid_otp_channel", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=SendOtp to space separated OtpChannels VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:97)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_SendOtp_Vid_all_Valid_Smoke, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SendOtp_Vid_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SendOtp_Vid_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "maskedEmail": "$IGNORE$", "maskedMobile": "$IGNORE$" }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/SendOtp/SendOtpResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=SendOtp with all valid details VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:97)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_SendOtp_NR_Email_Uin_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Params_WOEmail_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "maskedEmail": "$IGNORE$", "maskedMobile": "$IGNORE$" }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/SendOtp/SendOtpResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=SendOtp to unregistered email UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_SendOtp_NR_Phone_Uin_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Params_WOPhone_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "maskedEmail": "$IGNORE$", "maskedMobile": "$IGNORE$" }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/SendOtp/SendOtpResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=SendOtp to unregistered Phone UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_SendOtp_uin_Diff_RequestTime_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "2022-11-07T06:51:30.195Z", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=SendOtp with different requestTime UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_SendOtp_uin_Empty_OtpChannel_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": "" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendOtp/SendOtpEmptyOtpChannel, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=SendOtp with empty value in OtpChannels UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_SendOtp_uin_Empty_OtpChannels_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: ""},{channel: ""}] }, output={ "errors": [ { "errorCode": "invalid_otp_channel", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=SendOtp with empty value in OtpChannels UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_SendOtp_uin_Empty_individualId_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "individualId": "", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "invalid_identifier", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=SendOtp with empty value in individualId UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_SendOtp_uin_Empty_transactionId_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "invalid_transaction", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=SendOtp with empty value in transactionId UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_SendOtp_uin_Expired_transactionId_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "4eKDB4GPk6fP8XXEDY7rktwtQF6WiwrOCehT2CwyVT0", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "invalid_transaction", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=SendOtp with expired transactionId UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_SendOtp_uin_Future_RequestTime_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "2033-11-07T06:51:30.195Z", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=SendOtp with future requestTime UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_SendOtp_uin_Invalid_OtpChannels_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "Random1"},{channel: "Random2"}] }, output={ "errors": [ { "errorCode": "invalid_otp_channel", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=SendOtp to invalid OtpChannels UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_SendOtp_uin_Invalid_RequestTime_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "2022-11-08T06:35:53", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=SendOtp with invalid requestTime UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_SendOtp_uin_Invalid_individualId_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "@@#$#VGH", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "IDA-MLC-009", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=IDA-MLC-009,invalid_individual_id, kycFields=null, description=SendOtp with invalid individualId UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_SendOtp_uin_Invalid_transactionId_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "transactionId", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "invalid_transaction", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=SendOtp with invalid transactionId UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_SendOtp_uin_Missing_OtpChannel_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": "$REMOVE$" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendOtp/SendOtpEmptyOtpChannel, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=SendOtp without OtpChannels UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_SendOtp_uin_Missing_OtpChannels_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "$REMOVE$"},{channel: "$REMOVE$"}] }, output={ "errors": [ { "errorCode": "invalid_otp_channel", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=SendOtp without OtpChannels UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_SendOtp_uin_Missing_individualId_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "individualId": "$REMOVE$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "invalid_identifier", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=SendOtp without individualId UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_SendOtp_uin_Missing_transactionId_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$REMOVE$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "invalid_transaction", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=SendOtp without transactionId UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_SendOtp_uin_Null_OtpChannel_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": "null" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendOtp/SendOtpEmptyOtpChannel, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=SendOtp with Null in OtpChannels UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_SendOtp_uin_Null_OtpChannels_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "null"},{channel: "null"}] }, output={ "errors": [ { "errorCode": "invalid_otp_channel", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=SendOtp with Null in OtpChannels UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_SendOtp_uin_Null_individualId_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "null", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "IDA-MLC-009", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=IDA-MLC-009,invalid_individual_id, kycFields=null, description=SendOtp with Null in individualId UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_SendOtp_uin_Null_transactionId_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "null", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "invalid_transaction", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=SendOtp with Null in transactionId UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_SendOtp_uin_SpaceSeparated_otpChannels_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "s m s"}] }, output={ "errors": [ { "errorCode": "invalid_otp_channel", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=SendOtp to space separated OtpChannels UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_SendOtp_uin_all_Valid_Smoke, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Parameters_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "maskedEmail": "$IGNORE$", "maskedMobile": "$IGNORE$" }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/SendOtp/SendOtpResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=SendOtp with all valid details UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_Consent_Vid_Otp_Same_Claims, endPoint=/v1/esignet/authorization/v2/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Consent_Vid_2nd_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Consent_Vid_2nd_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Consent_Valid_Smoke_sid_vid$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Consent_Vid_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Consent_Vid_2nd_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Consent_Vid_2nd_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Consent_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "consentAction": "NOCAPTURE", "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/Consent/AuthenticateUserConsent/AuthenticateUserConsent, outputTemplate=esignet/Consent/AuthenticateUserConsent/AuthenticateUserConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Authenticate user consent Otp with same claims VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:98)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_Otp_Vid_Invalid_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Temporary_VID_Valid_Smoke_sid_vid$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Vid_Generation_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "IDA-OTA-012", "errorMessage": "$IGNORE$" } ], "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Authenticate user Otp with invalid VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:98)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_Otp_Vid_Valid_Smoke, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Vid_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Vid_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Vid_Generation_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Vid_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Vid_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/AuthenticateUser/AuthenticateUserResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Authenticate user with valid details VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:98)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_Vid_2_Otp_UnAuthenticated_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_2_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_2_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "IDA-OTA-005", "errorMessage": "$IGNORE$" } ], "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Send authentication request with unauthenticated transactionId VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:98)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_Vid_2nd_Otp_Valid_Smoke, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_2nd_vid_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_2nd_vid_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Parameters_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Valid_Parameters_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_2nd_vid_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_2nd_vid_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Parameters_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/AuthenticateUser/AuthenticateUserResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Authenticate user with 2nd Otp and valid details VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:98)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_Vid_Diff_AuthFactorType_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "authFactorType" : "bio", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type", "errorMessage": "$IGNORE$" } ], "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=invalid_challenge_length,invalid_auth_factor_type_format,invalid_challenge_format, kycFields=null, description=Authenticate user with different AuthFactorType VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:98)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_Vid_Diff_RequestTime_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "2022-11-07T06:51:30.195Z", "transactionId": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ], "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Authenticate user with different requestTime VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:98)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_Vid_Empty_AuthFactorType_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "authFactorType" : "", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type", "errorMessage": "$IGNORE$" } ], "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=invalid_auth_factor_type, kycFields=null, description=Authenticate user with empty value in AuthFactorType VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:98)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_Vid_Empty_Challenge_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "authFactorType" : "OTP", "challenge" : "", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge", "errorMessage": "$IGNORE$" } ], "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=invalid_challenge, kycFields=null, description=Authenticate user with empty value in challenge VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:98)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_Vid_Empty_IndividualId_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_transactionId$", "individualId": "", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "transactionId": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_identifier", "errorMessage": "$IGNORE$" } ], "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Authenticate user with empty value in individualId VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:98)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_Vid_Empty_TransactionId_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_transaction", "errorMessage": "$IGNORE$" } ], "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Authenticate user with empty value in transactionId VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:98)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_Vid_Expired_TransactionId_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "eZJZ0j3EeZJ_d9CsSakCoA0-Trbm6fOECY6J_q3dZtc", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_transaction", "errorMessage": "$IGNORE$" } ], "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Authenticate user with expired transactionId VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:98)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_Vid_Future_RequestTime_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "2033-11-07T06:51:30.195Z", "transactionId": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ], "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Authenticate user with future requestTime VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:98)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_Vid_Invalid_AuthFactorType_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "authFactorType" : "#$%FDF", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type", "errorMessage": "$IGNORE$" } ], "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=invalid_challenge_length,invalid_auth_factor_type, kycFields=null, description=Authenticate user with invalid AuthFactorType VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:98)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_Vid_Invalid_Challenge_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "authFactorType" : "OTP", "challenge" : "23432", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge", "errorMessage": "$IGNORE$" } ], "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Authenticate user with invalid challenge VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:98)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_Vid_Invalid_IndividualId_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_transactionId$", "individualId": "@#WE$#", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "IDA-MLC-009", "errorMessage": "$IGNORE$" } ], "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Authenticate user with invalid individualId VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:98)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_Vid_Invalid_Otp_Challenge_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "authFactorType" : "OTP", "challenge" : "113453", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "IDA-OTA-004", "errorMessage": "$IGNORE$" } ], "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Authenticate user with invalid Otp challenge VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:98)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_Vid_Invalid_RequestTime_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "2022-11-07T06:51:30", "transactionId": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ], "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Authenticate user with invalid requestTime VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:98)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_Vid_Invalid_TransactionId_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "transactionId", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_transaction", "errorMessage": "$IGNORE$" } ], "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Authenticate user with invalid transactionId VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:98)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_Vid_Missing_AuthFactorType_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "authFactorType" : "$REMOVE$", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type", "errorMessage": "$IGNORE$" } ], "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=invalid_auth_factor_type, kycFields=null, description=Authenticate user without AuthFactorType VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:98)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_Vid_Missing_Challenge_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "authFactorType" : "OTP", "challenge" : "$REMOVE$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge", "errorMessage": "$IGNORE$" } ], "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=invalid_challenge, kycFields=null, description=Authenticate user without challenge VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:98)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_Vid_Missing_IndividualId_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_transactionId$", "individualId": "$REMOVE$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_identifier", "errorMessage": "$IGNORE$" } ], "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Authenticate user without individualId VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:98)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_Vid_Missing_TransactionId_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$REMOVE$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "transactionId": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_transaction", "errorMessage": "$IGNORE$" } ], "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Authenticate user without transactionId VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:98)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_Vid_Null_AuthFactorType_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "authFactorType" : "null", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type", "errorMessage": "$IGNORE$" } ], "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=invalid_challenge_length,invalid_auth_factor_type, kycFields=null, description=Authenticate user with Null in AuthFactorType VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:98)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_Vid_Null_Challenge_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "authFactorType" : "OTP", "challenge" : "null", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge", "errorMessage": "$IGNORE$" } ], "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=invalid_challenge_length,invalid_challenge, kycFields=null, description=Authenticate user with Null in challenge VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:98)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_Vid_Null_IndividualId_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_transactionId$", "individualId": "null", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "IDA-MLC-009", "errorMessage": "$IGNORE$" } ], "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Authenticate user with Null in individualId VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:98)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_Vid_Null_TransactionId_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "null", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_transaction", "errorMessage": "$IGNORE$" } ], "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Authenticate user with Null in transactionId VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:98)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_Consent_uin_Otp_Same_Claims, endPoint=/v1/esignet/authorization/v2/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Consent_2nd_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Consent_2nd_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Consent_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Consent_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Consent_2nd_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Consent_2nd_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Consent_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "consentAction": "NOCAPTURE", "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/Consent/AuthenticateUserConsent/AuthenticateUserConsent, outputTemplate=esignet/Consent/AuthenticateUserConsent/AuthenticateUserConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Authenticate user consent with Otp and same claims UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_uin_2_Otp_UnAuthenticated_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_2_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_2_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Parameters_Sce2_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Valid_Parameters_Sce2_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Parameters_Sce2_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "IDA-OTA-005", "errorMessage": "$IGNORE$" } ], "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=IDA-OTA-005,invalid_transaction, kycFields=null, description=Send authenticate request with unauthenticated transactionId UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_uin_2nd_Otp_Valid_Smoke, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_2nd_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_2nd_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Parameters_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Valid_Parameters_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_2nd_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_2nd_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Parameters_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/AuthenticateUser/AuthenticateUserResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Authenticate user with 2nd Otp UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_uin_Diff_AuthFactorType_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "authFactorType" : "bio", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type", "errorMessage": "$IGNORE$" } ], "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=invalid_challenge_length,invalid_challenge_format, kycFields=null, description=Authenticate user with different AuthFactorType UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_uin_Diff_RequestTime_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "2022-11-07T06:51:30.195Z", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ], "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Authenticate user with different requestTime UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_uin_Empty_AuthFactorType_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "authFactorType" : "", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type", "errorMessage": "$IGNORE$" } ], "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=invalid_auth_factor_type, kycFields=null, description=Authenticate user with empty value in AuthFactorType UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_uin_Empty_Challenge_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge", "errorMessage": "$IGNORE$" } ], "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=invalid_challenge, kycFields=null, description=Authenticate user with empty value in challenge UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_uin_Empty_IndividualId_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_identifier", "errorMessage": "$IGNORE$" } ], "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Authenticate user with empty value in individualId UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_uin_Empty_TransactionId_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_transaction", "errorMessage": "$IGNORE$" } ], "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Authenticate user with empty value in transactionId UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_uin_Expired_TransactionId_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "eZJZ0j3EeZJ_d9CsSakCoA0-Trbm6fOECY6J_q3dZtc", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_transaction", "errorMessage": "$IGNORE$" } ], "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Authenticate user with expired transactionId UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_uin_Future_RequestTime_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "2033-11-07T06:51:30.195Z", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ], "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Authenticate user with future requestTime UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_uin_Invalid_AuthFactorType_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "authFactorType" : "#$%FDF", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type", "errorMessage": "$IGNORE$" } ], "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=invalid_auth_factor_type, kycFields=null, description=Authenticate user with invalid AuthFactorType UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_uin_Invalid_Challenge_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "23432", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge", "errorMessage": "$IGNORE$" } ], "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=invalid_challenge,invalid_challenge_length, kycFields=null, description=Authenticate user with invalid challenge UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_uin_Invalid_IndividualId_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "@#WE$#", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "IDA-MLC-009", "errorMessage": "$IGNORE$" } ], "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=IDA-MLC-009,invalid_individual_id, kycFields=null, description=Authenticate user with invalid individualId UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_uin_Invalid_Otp_Challenge_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "113453", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "IDA-OTA-004", "errorMessage": "$IGNORE$" } ], "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=IDA-OTA-004,auth_failed, kycFields=null, description=Authenticate user with invalid Otp challenge UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_uin_Invalid_RequestTime_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "2022-11-07T06:51:30", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ], "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Authenticate user with invalid requestTime UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_uin_Invalid_TransactionId_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "transactionId", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_transaction", "errorMessage": "$IGNORE$" } ], "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Authenticate user with invalid transactionId UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_uin_Missing_AuthFactorType_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "authFactorType" : "$REMOVE$", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type", "errorMessage": "$IGNORE$" } ], "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=invalid_auth_factor_type, kycFields=null, description=Authenticate user without AuthFactorType UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_uin_Missing_Challenge_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$REMOVE$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge", "errorMessage": "$IGNORE$" } ], "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=invalid_challenge, kycFields=null, description=Authenticate user without challenge UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_uin_Missing_IndividualId_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$REMOVE$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_identifier", "errorMessage": "$IGNORE$" } ], "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Authenticate user without individualId UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_uin_Missing_TransactionId_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$REMOVE$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_transaction", "errorMessage": "$IGNORE$" } ], "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Authenticate user without transactionId UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_uin_Null_AuthFactorType_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "authFactorType" : "null", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type", "errorMessage": "$IGNORE$" } ], "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Authenticate user with Null in AuthFactorType UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_uin_Null_Challenge_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "null", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge", "errorMessage": "$IGNORE$" } ], "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Authenticate user with Null in challenge UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_uin_Null_IndividualId_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "null", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "IDA-MLC-009", "errorMessage": "$IGNORE$" } ], "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=IDA-MLC-009,invalid_individual_id, kycFields=null, description=Authenticate user with Null in individualId UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_uin_Null_TransactionId_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "null", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_transaction", "errorMessage": "$IGNORE$" } ], "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Authenticate user with Null in transactionId UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_uin_Other_Otp_Valid_Smoke, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/AuthenticateUser/AuthenticateUserResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Authenticate user with other Otp valid details UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_uin_Otp_Valid_Smoke, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Parameters_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Valid_Parameters_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Parameters_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/AuthenticateUser/AuthenticateUserResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Authenticate user with Otp UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_Vid_All_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Vid_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Vid_Valid_Smoke_sid_transactionId$", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}] }, output={ "redirectUri": "$IGNORE$" }, inputTemplate=esignet/AuthorizationCode/AuthorizationCode, outputTemplate=esignet/AuthorizationCode/AuthorizationCodeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Authorization code request with all valid details VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:99)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_Vid_Diff_requestTime_Neg, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "2022-11-07T06:51:30.195Z", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}] }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/AuthorizationCode/AuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Authorization code request with different requestTime VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:99)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_Vid_Empty_PermittedAuthorizeScopes_Neg, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_2nd_vid_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_2nd_vid_Valid_Smoke_sid_transactionId$", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}], "permittedAuthorizeScopes": [{scope: ""}] }, output={ "errors": [ { "errorCode": "invalid_permitted_scope", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/AuthorizationCode/AuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Authorization code request with empty value in PermittedAuthorizeScopes VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:99)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_Vid_Empty_TransactionId_Neg, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Vid_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}] }, output={ "errors": [ { "errorCode": "invalid_transaction", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/AuthorizationCode/AuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Authorization code request with empty value in transactionId VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:99)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_Vid_Empty_acceptedClaims_Neg, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Vid_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Vid_Valid_Smoke_sid_transactionId$", "acceptedClaims": [{claim: ""}] }, output={ "errors": [ { "errorCode": "invalid_transaction", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/AuthorizationCode/AuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Authorization code request with empty accepted claims VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:99)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_Vid_Expired_TransactionId_Neg, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Vid_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "EvOHK0ewF4AlCAVAw-aVZD1JXDNBVNtkIPGrsvxPTkw", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}] }, output={ "errors": [ { "errorCode": "invalid_transaction", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/AuthorizationCode/AuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Authorization code request with expired transactionId VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:99)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_Vid_Future_RequestTime_Neg, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "2033-11-07T06:51:30.195Z", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}] }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/AuthorizationCode/AuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Authorization code request with future requestTime VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:99)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_Vid_Invalid_PermittedAuthorizeScopes_Neg, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_2nd_vid_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_2nd_vid_Valid_Smoke_sid_transactionId$", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}], "permittedAuthorizeScopes": [{scope: "abc"}] }, output={ "errors": [ { "errorCode": "invalid_permitted_scope", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/AuthorizationCode/AuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Authorization code request with invalid PermittedAuthorizeScopes VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:99)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_Vid_Invalid_TransactionId_Neg, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Vid_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "transactionId", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}] }, output={ "errors": [ { "errorCode": "invalid_transaction", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/AuthorizationCode/AuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Authorization code request with invalid transactionId VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:99)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_Vid_Invalid_acceptedClaims_Neg, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Vid_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Vid_Valid_Smoke_sid_transactionId$", "acceptedClaims": [{claim: "jsdgh#4$#"}] }, output={ "errors": [ { "errorCode": "invalid_transaction", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/AuthorizationCode/AuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Authorization code request with invalid accepted claims VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:99)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_Vid_Invalid_requestTime_Neg, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "2022-11-08T06:35:53", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}] }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/AuthorizationCode/AuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Authorization code request with invalid requestTime VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:99)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_Vid_Missing_Claims_Neg, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_2_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_2_all_Valid_Smoke_sid_transactionId$", "acceptedClaims": [{claim: "$REMOVE$"}] }, output={ "errors": [ { "errorCode": "invalid_transaction" } ] }, inputTemplate=esignet/AuthorizationCode/AuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Authorization code request without claims VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:99)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_Vid_Missing_TransactionId_Neg, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Vid_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$REMOVE$", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}] }, output={ "errors": [ { "errorCode": "invalid_transaction", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/AuthorizationCode/AuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Authorization code request without transactionId VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:99)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_Vid_Null_PermittedAuthorizeScopes_Neg, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_2nd_vid_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_2nd_vid_Valid_Smoke_sid_transactionId$", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}], "permittedAuthorizeScopes": [{scope: "null"}] }, output={ "errors": [ { "errorCode": "invalid_permitted_scope", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/AuthorizationCode/AuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Authorization code request with Null in PermittedAuthorizeScopes VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:99)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_Vid_Null_TransactionId_Neg, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Vid_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "null", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}] }, output={ "errors": [ { "errorCode": "invalid_transaction", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/AuthorizationCode/AuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Authorization code request with Null in transactionId VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:99)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_Vid_Null_acceptedClaims_Neg, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Vid_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Vid_Valid_Smoke_sid_transactionId$", "acceptedClaims": [{claim: "null"}] }, output={ "errors": [ { "errorCode": "invalid_transaction", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/AuthorizationCode/AuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Authorization code request with Null in accepted claims VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:99)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_uin_All_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}] }, output={ "redirectUri": "$IGNORE$" }, inputTemplate=esignet/AuthorizationCode/AuthorizationCode, outputTemplate=esignet/AuthorizationCode/AuthorizationCodeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Authorization code request with all valid details UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_uin_Diff_requestTime_Neg, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "2022-11-07T06:51:30.195Z", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}] }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/AuthorizationCode/AuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Authorization code request with different requestTime UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_uin_Empty_PermittedAuthorizeScopes_Neg, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_2nd_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_2nd_Valid_Smoke_sid_transactionId$", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}], "permittedAuthorizeScopes": [{scope: ""}] }, output={ "errors": [ { "errorCode": "invalid_permitted_scope", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/AuthorizationCode/AuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Authorization code request with empty PermittedAuthorizeScopes UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_uin_Empty_TransactionId_Neg, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}] }, output={ "errors": [ { "errorCode": "invalid_transaction", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/AuthorizationCode/AuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Authorization code request with empty value in transactionId UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_uin_Empty_acceptedClaims_Neg, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "acceptedClaims": [{claim: ""}] }, output={ "errors": [ { "errorCode": "invalid_transaction", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/AuthorizationCode/AuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Authorization code request with empty accepted claims UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_uin_Expired_TransactionId_Neg, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "EvOHK0ewF4AlCAVAw-aVZD1JXDNBVNtkIPGrsvxPTkw", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}] }, output={ "errors": [ { "errorCode": "invalid_transaction", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/AuthorizationCode/AuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Authorization code request with expired transactionId UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_uin_Future_RequestTime_Neg, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "2033-11-07T06:51:30.195Z", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}] }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/AuthorizationCode/AuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Authorization code request with future requestTime UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_uin_Invalid_PermittedAuthorizeScopes_Neg, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_2nd_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_2nd_Valid_Smoke_sid_transactionId$", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}], "permittedAuthorizeScopes": [{scope: "abc"}] }, output={ "errors": [ { "errorCode": "invalid_permitted_scope", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/AuthorizationCode/AuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Authorization code request with invalid PermittedAuthorizeScopes UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_uin_Invalid_TransactionId_Neg, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "transactionId", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}] }, output={ "errors": [ { "errorCode": "invalid_transaction", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/AuthorizationCode/AuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Authorization code request with invalid transactionId UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_uin_Invalid_acceptedClaims_Neg, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "acceptedClaims": [{claim: "jsdgh#4$#"}] }, output={ "errors": [ { "errorCode": "invalid_transaction", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/AuthorizationCode/AuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Authorization code request with invalid accepted claims UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_uin_Invalid_requestTime_Neg, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "2022-11-08T06:35:53", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}] }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/AuthorizationCode/AuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Authorization code request with invalid requestTime UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_uin_Missing_Claims_Pos, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_2_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_2_all_Valid_Smoke_sid_transactionId$", "acceptedClaims": [{claim: "$REMOVE$"}] }, output={ "errors": [ { "errorCode": "invalid_transaction" } ] }, inputTemplate=esignet/AuthorizationCode/AuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Authorization code request without claims UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_uin_Missing_TransactionId_Neg, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$REMOVE$", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}] }, output={ "errors": [ { "errorCode": "invalid_transaction", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/AuthorizationCode/AuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Authorization code request without transactionId UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_uin_Null_PermittedAuthorizeScopes_Neg, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_2nd_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_2nd_Valid_Smoke_sid_transactionId$", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}], "permittedAuthorizeScopes": [{scope: "null"}] }, output={ "errors": [ { "errorCode": "invalid_permitted_scope", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/AuthorizationCode/AuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Authorization code request with Null in PermittedAuthorizeScopes UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_uin_Null_TransactionId_Neg, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "null", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}] }, output={ "errors": [ { "errorCode": "invalid_transaction", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/AuthorizationCode/AuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Authorization code request with Null in transactionId UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_uin_Null_acceptedClaims_Neg, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "acceptedClaims": [{claim: "null"}] }, output={ "errors": [ { "errorCode": "invalid_transaction", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/AuthorizationCode/AuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Authorization code request with Null in accepted claims UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_Vid_Empty_ClientAssertionType_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_Vid_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_assertion_type" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with empty value in ClientAssertionType VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:101)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_Vid_Empty_ClientAssertion_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_Vid_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_assertion" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with empty value in ClientAssertion VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:101)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_Vid_Empty_ClientId_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_Vid_All_Valid_Smoke_sid_code$", "client_id": "", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_transaction" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with empty value in ClientId VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:101)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_Vid_Empty_Code_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_auth_code" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with empty value in code VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:101)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_Vid_Empty_Grant_type_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "", "code": "$ID:AuthorizationCode_Vid_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_grant_type" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with empty value in grant_type VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:101)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_Vid_Empty_Redirect_uri_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_Vid_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "" }, output={ "error": "invalid_redirect_uri" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with empty value in redirect uri VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:101)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_Vid_Incorrect_ClientAssertionType_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_Vid_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn ietf params oauth client-assertion-type jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_assertion_type" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with incorrect ClientAssertionType VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:101)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_Vid_Invalid_ClientAssertionType_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_Vid_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "sdhb$$#@", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_assertion_type" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with invalid ClientAssertionType VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:101)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_Vid_Invalid_ClientAssertion_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_Vid_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "CLIENT_ASSERTION_JWK", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_transaction" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with invalid ClientAssertion VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:101)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_Vid_Invalid_ClientId_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_Vid_All_Valid_Smoke_sid_code$", "client_id": "Client_clientId", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_transaction" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with invalid ClientId VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:101)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_Vid_Invalid_Code_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "AuthorizationCode_Vid_All_Valid_Smoke_sid_code", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_transaction" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with invalid code VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:101)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_Vid_Invalid_Grant_type_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "hbkd$#$@@", "code": "$ID:AuthorizationCode_Vid_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_grant_type" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with invalid grant_type VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:101)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_Vid_Invalid_Redirect_uri_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_Vid_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "https://new-services.com/newprofile" }, output={ "error": "invalid_transaction" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with invalid redirect uri VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:101)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_Vid_Missing_ClientAssertionType_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_Vid_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "$REMOVE$", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_assertion_type" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token without ClientAssertionType VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:101)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_Vid_Missing_ClientAssertion_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_Vid_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$REMOVE$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_assertion" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token without ClientAssertion VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:101)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_Vid_Missing_ClientId_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_Vid_All_Valid_Smoke_sid_code$", "client_id": "$REMOVE$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_transaction" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token without ClientId VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:101)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_Vid_Missing_Code_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$REMOVE$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_auth_code" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token without code VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:101)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_Vid_Missing_Grant_type_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "$REMOVE$", "code": "$ID:AuthorizationCode_Vid_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_grant_type" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token without grant_type VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:101)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_Vid_Missing_Redirect_uri_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_Vid_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$REMOVE$" }, output={ "error": "invalid_redirect_uri" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token without redirect uri VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:101)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_Vid_Null_ClientAssertionType_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_Vid_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "null", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_assertion_type" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with Null in ClientAssertionType VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:101)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_Vid_Null_ClientAssertion_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_Vid_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "null", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_transaction" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with Null in ClientAssertion VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:101)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_Vid_Null_ClientId_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_Vid_All_Valid_Smoke_sid_code$", "client_id": "null", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_transaction" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with Null in ClientId VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:101)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_Vid_Null_Code_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "null", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_transaction" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with Null in code VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:101)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_Vid_Null_Grant_type_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "null", "code": "$ID:AuthorizationCode_Vid_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_grant_type" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with Null in grant_type VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:101)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_Vid_Null_Redirect_uri_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_Vid_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "null" }, output={ "error": "invalid_redirect_uri" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with Null in redirect uri VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:101)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_Vid_SpaceFirst_ClientAssertionType_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_Vid_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": " urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_assertion_type" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with space in the beginning of ClientAssertionType VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:101)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_Vid_SpaceFirst_Grant_type_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": " authorization_code", "code": "$ID:AuthorizationCode_Vid_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_grant_type" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with space in the beginning of grant_type VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:101)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_Vid_SpaceLast_ClientAssertionType_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_Vid_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer ", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_assertion_type" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with space in the end of ClientAssertionType VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:101)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_Vid_SpaceLast_Grant_type_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code ", "code": "$ID:AuthorizationCode_Vid_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_grant_type" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with space in the end of grant_type VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:101)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_Vid_Used_Code_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_Vid_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_transaction" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with used code VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:101)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_Vid_Valid_Smoke_sid, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_Vid_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "token_type": "Bearer" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/GenerateToken/GenerateTokenResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with all valid details VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:101)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_uin_Empty_ClientAssertionType_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_assertion_type" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with empty value in client assertion type UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_uin_Empty_ClientAssertion_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_assertion" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with empty value in client assertion UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_uin_Empty_ClientId_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "client_id": "", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_transaction" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with empty value in ClientId UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_uin_Empty_Code_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_auth_code" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with empty value in code UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_uin_Empty_Grant_type_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "", "code": "$ID:AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_grant_type" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with empty grant_type UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_uin_Empty_Redirect_uri_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "" }, output={ "error": "invalid_redirect_uri" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with empty value in redirect uri UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_uin_Incorrect_ClientAssertionType_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn ietf params oauth client-assertion-type jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_assertion_type" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with incorrect client assertion type UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_uin_Invalid_ClientAssertionType_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "sdhb$$#@", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_assertion_type" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with invalid client assertion type UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_uin_Invalid_ClientAssertion_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "CLIENT_ASSERTION_JWK", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_transaction" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with invalid client assertion UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_uin_Invalid_ClientId_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "client_id": "Client_clientId", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_transaction" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with invalid ClientId UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_uin_Invalid_Code_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "AuthorizationCode_uin_All_Valid_Smoke_sid_code", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_transaction" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with invalid code UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_uin_Invalid_Grant_type_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "hbkd$#$@@", "code": "$ID:AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_grant_type" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with invalid grant_type UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_uin_Invalid_Redirect_uri_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "https://new-services.com/newprofile" }, output={ "error": "invalid_transaction" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with invalid redirect uri UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_uin_Missing_ClientAssertionType_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "$REMOVE$", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_assertion_type" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token without client assertion type UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_uin_Missing_ClientAssertion_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$REMOVE$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_assertion" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token without client assertion UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_uin_Missing_ClientId_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "client_id": "$REMOVE$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_transaction" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token without ClientId UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_uin_Missing_Code_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$REMOVE$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_auth_code" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token without code UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_uin_Missing_Grant_type_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "$REMOVE$", "code": "$ID:AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_grant_type" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token without grant_type UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_uin_Missing_Redirect_uri_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$REMOVE$" }, output={ "error": "invalid_redirect_uri" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token without redirect uri UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_uin_Null_ClientAssertionType_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "null", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_assertion_type" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with Null in client assertion type UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_uin_Null_ClientAssertion_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "null", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_transaction" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with Null in client assertion UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_uin_Null_ClientId_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "client_id": "null", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_transaction" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with Null in ClientId UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_uin_Null_Code_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "null", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_transaction" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with Null in code UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_uin_Null_Grant_type_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "null", "code": "$ID:AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_grant_type" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with Null in grant_type UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_uin_Null_Redirect_uri_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "null" }, output={ "error": "invalid_redirect_uri" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with Null in redirect uri UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_uin_SpaceFirst_ClientAssertionType_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": " urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_assertion_type" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with space in the beginning of client assertion type UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_uin_SpaceFirst_Grant_type_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": " authorization_code", "code": "$ID:AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_grant_type" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with space in the beginning of grant_type UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_uin_SpaceLast_ClientAssertionType_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer ", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_assertion_type" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with space in the end of client assertion type UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_uin_SpaceLast_Grant_type_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code ", "code": "$ID:AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_grant_type" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with space in the end of grant_type UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_uin_Used_Code_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_transaction" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with used code UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_uin_Valid_Smoke_sid, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "token_type": "Bearer" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/GenerateToken/GenerateTokenResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with all valid details UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetOidcUserInfo_Vid_IdpAccessToken_StatusCode_Invalid_Token_Neg, endPoint=/v1/esignet/oidc/userinfo, role=resident, templateFields=null, input={ "idpAccessToken": "eyJraWQiOiJLeVRFWVJobkQwT0F2em1RTnZsQU85STBxMjBxcjhab3p3UHI5bEhCY0NnIiwiYWxnIjoiUlMyNTYifQ.eyJzdWIiOiJQVlJtZkRwZ1pKcXZMTWZZcTZwcUItTDNZQTZXR3dYZmxiTlJpVWF6THJjIiwiYXVkIjoibW9zaXA5MTE2NjkxMTMzMDI3MDQiLCJzY29wZSI6IiIsImlzcyI6Imh0dHBzOlwvXC9hcGkucWEtMTIxLm1vc2lwLm5ldFwvdjFcL2lkcCIsImV4cCI6MTY2OTExNDE3NCwiaWF0IjoxNjY5MTEzNTc0fQ.e-cJLhWtYyg8g-T1OrEYSTgH9QX8AzaqtwEjIZsv-63hCySkTcT7n61iHd5njr7eIVuOi7K4JSBKhHhQhThlBaWrdkyihQuTyefFOTAH9UUEow8_T1MSIDun3G6-ae61mfAUZG3IvR1X2AxsFm8oor4rCZd8QLE_-yS1z8LPAg8VzRNj0th1NV_A3jsjeCySzst-saAwzAnBGPm5GncoEuo3Ftxmy2UcVO0l3ncwzebC19DDarCHRx5eNCDK6Z7oRxvPBgUKNXOwnfDO2gbjUG3fq9xCWS3ZPf-G-iMX9PRWsl2Bp7K4Ej6b_Y0nLdOHdJuwH-kKKiZMSIAMkSg4ww" }, output=401, inputTemplate=esignet/GetOidcUserInfo/GetOidcUserInfo, outputTemplate=esignet/GetOidcUserInfo/GetOidcUserInfoResult, restMethod=get, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get OIDC user info with invalid token VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.GetWithParam.test(GetWithParam.java:95)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_GetOidcUserInfo_Vid_IdpAccessToken_StatusCode_Valid_Smoke_sid, endPoint=/v1/esignet/oidc/userinfo, role=resident, templateFields=null, input={ "idpAccessToken": "$ID:GenerateToken_Vid_Valid_Smoke_sid_access_token$" }, output=200, inputTemplate=esignet/GetOidcUserInfo/GetOidcUserInfo, outputTemplate=esignet/GetOidcUserInfo/GetOidcUserInfoResult, restMethod=get, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get OIDC user info with all valid details VID, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.GetWithParam.test(GetWithParam.java:95)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_GetOidcUserInfo_uin_IdpAccessToken_StatusCode_Invalid_Token_Neg, endPoint=/v1/esignet/oidc/userinfo, role=resident, templateFields=null, input={ "idpAccessToken": "eyJraWQiOiJLeVRFWVJobkQwT0F2em1RTnZsQU85STBxMjBxcjhab3p3UHI5bEhCY0NnIiwiYWxnIjoiUlMyNTYifQ.eyJzdWIiOiJQVlJtZkRwZ1pKcXZMTWZZcTZwcUItTDNZQTZXR3dYZmxiTlJpVWF6THJjIiwiYXVkIjoibW9zaXA5MTE2NjkxMTMzMDI3MDQiLCJzY29wZSI6IiIsImlzcyI6Imh0dHBzOlwvXC9hcGkucWEtMTIxLm1vc2lwLm5ldFwvdjFcL2lkcCIsImV4cCI6MTY2OTExNDE3NCwiaWF0IjoxNjY5MTEzNTc0fQ.e-cJLhWtYyg8g-T1OrEYSTgH9QX8AzaqtwEjIZsv-63hCySkTcT7n61iHd5njr7eIVuOi7K4JSBKhHhQhThlBaWrdkyihQuTyefFOTAH9UUEow8_T1MSIDun3G6-ae61mfAUZG3IvR1X2AxsFm8oor4rCZd8QLE_-yS1z8LPAg8VzRNj0th1NV_A3jsjeCySzst-saAwzAnBGPm5GncoEuo3Ftxmy2UcVO0l3ncwzebC19DDarCHRx5eNCDK6Z7oRxvPBgUKNXOwnfDO2gbjUG3fq9xCWS3ZPf-G-iMX9PRWsl2Bp7K4Ej6b_Y0nLdOHdJuwH-kKKiZMSIAMkSg4ww" }, output=401, inputTemplate=esignet/GetOidcUserInfo/GetOidcUserInfo, outputTemplate=esignet/GetOidcUserInfo/GetOidcUserInfoResult, restMethod=get, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get OIDC user info with invalid token UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetOidcUserInfo_uin_IdpAccessToken_StatusCode_Valid_Smoke_sid, endPoint=/v1/esignet/oidc/userinfo, role=resident, templateFields=null, input={ "idpAccessToken": "$ID:GenerateToken_uin_Valid_Smoke_sid_access_token$" }, output=200, inputTemplate=esignet/GetOidcUserInfo/GetOidcUserInfo, outputTemplate=esignet/GetOidcUserInfo/GetOidcUserInfoResult, restMethod=get, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get OIDC user info with all valid details UIN, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_CreateOIDCClient_StatusCode_Diff_Token_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client, role=idrepo, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMID$2", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output=403, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client with different invalid token, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:259)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:91)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_CreateOIDCClient_2_Same_RelyParty_Valid_Smoke_sid, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMID$2", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "clientId": "$IGNORE$", "status": "ACTIVE" }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/CreateOIDCClient/CreateOIDCClientResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client with two same relying party, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_CreateOIDCClient_Diff_RequestTime_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "2022-11-07T06:51:30.195Z", "clientId": "$RANDOMID$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client with different requestTime, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_CreateOIDCClient_Empty_authContextRefs, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMID$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: ""}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_acr", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client with missing authContextRefs, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_CreateOIDCClient_Empty_clientAuthMethods_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMID$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "" }, output={ "errors": [ { "errorCode": "invalid_client_auth", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client with an empty clientAuthMethods, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_CreateOIDCClient_Empty_grantTypes_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMID$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_grant_type", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client with an empty grantTypes, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_CreateOIDCClient_Exceding_Range_ClientId_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "8nr2xe4jlxa54n9okvcv1kbjjl7srfy3veqp88g2u1nn2do7za1svus4hdfj8nr2xe4jlxa54n9okvcv1kbjjl7srfy3veqp88g2u1nn2do7za1svus4hdfj", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_client_id", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client with exceding range clientId, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_CreateOIDCClient_Exceding_Range_ClientName_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "8nr2xe4jlxa54n9okvcv1", "clientName": "vc0neervbsu10dfbo2vu282lt0r9hf044b1q8wm957k97wpjmrmwz6kcbpv5p9zyocksfyg41u4rpm71hhqy29sqcixg1i0ed2aaxlfd9f5wtpf3py2igi3orhttvh6vqys16nmnke9qwjjr8byjflotzyw078t1azc9rvoftuhdis40mgy9uoyzoypwdbomdkjg3v9y216y7bfpiyoenhgaudirgn432u3c2x27z23zvd094m7ug4lvid8av6jhc24j", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_client_name", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client with exceding range clientName, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_CreateOIDCClient_Invalid_Exceding_Range_logoUri_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "8nr2xe4jlxa54n9okvcv1", "clientName": "MOSIP OIDC CLIENT", "logoUri": "jfwy2ky9paqhidten6vg2g4iznvd7l3b6pjnghdvlqzpzmcyq8vdwjm0jalich5t3ro7j716t5zsbg8rqfc99py504vqq74b7p6jtyux9qzzz9ufu24hrgicws8ntszzcwva4tlj8lz1tfubr1vneuv503kn5b591zi0gdfqgj440z86syg0ikpwhpy0hgw1qp5px8dstsoncuc5f43t0hpj3rmiejdhyswpeu6fte0z7811zxauzadx22ii3rsffc7yxu216sqtblwfly7j8r7u32vi47grtqza0yvvondsnek32tktqtb7vycyo33nqhv7rpt5al4vxxa70fablzlr7rf3xzo0u2kti791nywnqed0du1e8356vfu5fsm1tfk6hbscc7ys77hipwernpsctvw3fgvk06qunxylzfmpwz645y8p8liv8s76nwrd3xae1amleljiheuvmrn2qqzcojv65tdreti1cy1sskw3srbgig0h4n6w3l9nts4pb90l19cgmp9y9h54m69uqwwexx8r5jgtcb3cpixwg35gjhzqjo8ub0lrk4etr81b25couzom4mr2ek8s416329cd8fh9k8w2cyr2uas0h9gvvvvvpbh7701kgmpoz712mi37ny7kv6oionrf3370ycsja9eenrr3aybnpt2htl65th9fqlwcpszvhr6ffhcu6q5fss521jr111cfeeobn6byherzj6ayr0io7kgjytucorl2hwir7ragjsdshd579ts55230dvmb4iv8823p7qjf47ik66igdu6b5pn4v3108hfi3gjmre12dusj6g1066n59400183urt2ungulo395k0krhvjotfkg42msujren8pnnz8pmf6vgc3megxhzi3ypycl7o77iq2596n9141mgmgwbe2vlfcc994mv483vwjr7dko10xv3y9n60wfb04a9egu83vws66hgljzey2ore7amcvi7t89kmjfwsy8mywtmokbh9d9jr0a40p76is71t", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_uri", "errorMessage": "request.logoUri: invalid_uri" } ] }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client with exceding range logoUri, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_CreateOIDCClient_Invalid_Exceding_Range_relyingPartyId_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "8nr2xe4jlxa54n9okvcv1", "clientName": "MOSIP OIDC CLIENT", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "8nr2xe4jlxa54n9okvcv1kbjjl7srfy3veqp88g2u1nn2do7za1svus4hdfj8nr2xe4jlxa54n9okvcv1kbjjl7srfy3veqp88g2u1nn2do7za1svus4hdfj", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_rp_id", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client with exceding range relyingpartyId, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_CreateOIDCClient_Invalid_Range_ClientId_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_client_id", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client with invalid range clientId, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_CreateOIDCClient_Invalid_Range_ClientName_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "8nr2xe4jlxa54n9okvcv1", "clientName": "", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_client_name", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client with invalid range clientName, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_CreateOIDCClient_Invalid_Range_logoUri_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "8nr2xe4jlxa54n9okvcv1", "clientName": "MOSIP OIDC CLIENT", "logoUri": "", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_uri", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client with invalid range logoUri, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_CreateOIDCClient_Invalid_Range_relyingPartyId_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "8nr2xe4jlxa54n9okvcv1", "clientName": "MOSIP OIDC CLIENT", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_rp_id", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client with invalid range relyingpartyId, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_CreateOIDCClient_Invalid_RequestTime_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "2022-11-07T06:51:30", "clientId": "$RANDOMID$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client with invalid requestTime and all valid data, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_CreateOIDCClient_Invalid_SpaceFirst_ClientId_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": " 8nr2xe4jlxa54n9okvcv12", "clientName": "MOSIP OIDC CLIENT", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_client_id", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client with a value starting with space in clientId, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_CreateOIDCClient_Invalid_SpaceLast_ClientId_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "8nr2xe4jlxa54n9okvcv12 ", "clientName": "MOSIP OIDC CLIENT", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_client_id", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client with a value ending with space in clientId, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_CreateOIDCClient_Invalid_SpaceMiddle_ClientId_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "8nr2xe4j lxa54n9okvcv12", "clientName": "MOSIP OIDC CLIENT", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_client_id", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client with clientId value having space in middle, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_CreateOIDCClient_Invalid_UserClaims, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RA5315$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "xyz", "userClaims2": "fd@gh.com", "userClaims3": "$REMOVE$", "userClaims4": "$REMOVE$", "userClaims5": "$REMOVE$", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_claim", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client with invalid userClaims, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_CreateOIDCClient_Invalid_authContextRefs, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMID$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "invalid_acr"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_acr", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client with invaid authContextRefs, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_CreateOIDCClient_Invalid_clientAuthMethods_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMID$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "$$#@@A" }, output={ "errors": [ { "errorCode": "invalid_client_auth", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client with different invalid clientAuthMethods, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_CreateOIDCClient_Invalid_grantTypes_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMID$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "$$@###$", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_grant_type", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client with different invalid grantTypes, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_CreateOIDCClient_Invalid_publicKey, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RA5315$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_public_key", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClientInvPublicKey, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client with invalid publicKey, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_CreateOIDCClient_Missing_authContextRefs, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMID$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "$REMOVE$"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_acr", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client with missing authContextRefs, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_CreateOIDCClient_Missing_clientAuthMethods_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMID$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "$REMOVE$" }, output={ "errors": [ { "errorCode": "invalid_client_auth", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client with missing clientAuthMethods, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_CreateOIDCClient_Missing_grantTypes_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMID$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "$REMOVE$", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_grant_type", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client with missing grantTypes, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_CreateOIDCClient_Missing_redirectUris, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "2222222dddfggf", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$REMOVE$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_redirect_uri", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client with with missing redirectUris, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_CreateOIDCClient_Null_authContextRefs, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMID$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "null"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_acr", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client with null value in authContextRefs, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_CreateOIDCClient_Null_clientAuthMethods_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMID$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "null" }, output={ "errors": [ { "errorCode": "invalid_client_auth", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client with null value in clientAuthMethods, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_CreateOIDCClient_Null_grantTypes_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMID$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "null", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_grant_type", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client with null value in grantTypes, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_CreateOIDCClient_StatusCode_Invalid_Token_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMID$2", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output=401, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client with invalid token, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_CreateOIDCClient_all_Valid_Smoke_sid, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMID$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "clientId": "$IGNORE$", "status": "ACTIVE" }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/CreateOIDCClient/CreateOIDCClientResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client with all valid data, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_UpdateOIDCClient_StatusCode_Diff_Token_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client/{clientId}, role=idrepo, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output=403, inputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClient, outputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClientResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC client with different invalid token, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:259)
at io.mosip.testrig.apirig.esignet.testscripts.PutWithPathParamsAndBody.test(PutWithPathParamsAndBody.java:85)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_UpdateOIDCClient_2_all_Valid_Smoke, endPoint=/v1/esignet/client-mgmt/oidc-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClient_2_Same_RelyParty_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "clientId": "$IGNORE$", "status": "ACTIVE" }, inputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClient, outputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClientResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC client with different valid data, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_UpdateOIDCClient_Diff_RequestTime_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "2022-11-07T06:51:30.195Z", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC client with different invalid requestTime, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_UpdateOIDCClient_Empty_authContextRefs_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: ""}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_acr", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC client with an empty authContextRefs, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_UpdateOIDCClient_Empty_clientAuthMethods_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "" }, output={ "errors": [ { "errorCode": "invalid_client_auth", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC client with empty clientAuthMethods, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_UpdateOIDCClient_Empty_grantTypes_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_grant_type", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC client with an empty grantTypes, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_UpdateOIDCClient_Empty_redirectUris_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "redirectUris": "", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_redirect_uri", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC client with an empty redirectUris, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_UpdateOIDCClient_Exceding_Range_ClientId_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "8nr2xe4jlxa54n9okvcv1kbjjl7srfy3veqp88g2u1nn2do7za1svus4hdfj", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_client_id", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC client with exceding range clientId, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_UpdateOIDCClient_Exceding_Range_ClientName, endPoint=/v1/esignet/client-mgmt/oidc-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "vc0neervbsu10dfbo2vu282lt0r9hf044b1q8wm957k97wpjmrmwz6kcbpv5p9zyocksfyg41u4rpm71hhqy29sqcixg1i0ed2aaxlfd9f5wtpf3py2igi3orhttvh6vqys16nmnke9qwjjr8byjflotzyw078t1azc9rvoftuhdis40mgy9uoyzoypwdbomdkjg3v9y216y7bfpiyoenhgaudirgn432u3c2x27z23zvd094m7ug4lvid8av6jhc24j", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_client_name", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC client with exceding range clientName, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_UpdateOIDCClient_Exceding_Range_logoUri_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "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", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_uri", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC client with exceding range logoUri, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_UpdateOIDCClient_Invalid_Range_ClientId_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": " ", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_client_id", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC client with invalid range, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_UpdateOIDCClient_Invalid_Range_ClientName, endPoint=/v1/esignet/client-mgmt/oidc-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_client_name", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC client with all invalid range clientName, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_UpdateOIDCClient_Invalid_Range_logoUri_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_uri", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC client with invalid range logoUri, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_UpdateOIDCClient_Invalid_RequestTime_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "2022-11-07T06:51:30", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC client with invalid requestTime, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_UpdateOIDCClient_Invalid_authContextRefs_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "invalid_acr"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_acr", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC client with invalid authContextRefs, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_UpdateOIDCClient_Invalid_clientAuthMethods_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "$$#@@A" }, output={ "errors": [ { "errorCode": "invalid_client_auth", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC client with invalid clientAuthMethods, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_UpdateOIDCClient_Invalid_clientId_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "@#DDSS$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_client_id", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC client with invalid clientId, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_UpdateOIDCClient_Invalid_grantTypes_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "$$@###$", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_grant_type", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC client with invalid grantTypes, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_UpdateOIDCClient_Invalid_status_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "@$$##%", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_status", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC client with invalid status, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_UpdateOIDCClient_Invalid_userClaims_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "xyz", "userClaims2": "fd@gh.com", "userClaims3": "$REMOVE$", "userClaims4": "$REMOVE$", "userClaims5": "$REMOVE$", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_claim", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC client with invalid userClaims, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_UpdateOIDCClient_Missing_authContextRefs_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "$REMOVE$"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_acr", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC client with missing authContextRefs, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_UpdateOIDCClient_Missing_clientAuthMethods_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "$REMOVE$" }, output={ "errors": [ { "errorCode": "invalid_client_auth", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC client with missing clientAuthMethods, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_UpdateOIDCClient_Missing_grantTypes_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "$REMOVE$", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_grant_type", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC client with missing grantTypes, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_UpdateOIDCClient_Missing_redirectUris_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "redirectUris": "$REMOVE$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_redirect_uri", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC client with missing redirectUris, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_UpdateOIDCClient_Null_authContextRefs_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "null"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_acr", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC client with null authContextRefs, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_UpdateOIDCClient_Null_clientAuthMethods_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "null" }, output={ "errors": [ { "errorCode": "invalid_client_auth", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC client with null value in clientAuthMethods, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_UpdateOIDCClient_Null_grantTypes_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "null", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_grant_type", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC client with null grantTypes, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_UpdateOIDCClient_StatusCode_Invalid_Token_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client/{clientId}, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output=401, inputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClient, outputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClientResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC client with invalid token, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_UpdateOIDCClient_all_Valid_Smoke, endPoint=/v1/esignet/client-mgmt/oidc-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "clientId": "$IGNORE$", "status": "ACTIVE" }, inputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClient, outputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClientResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC client with all valid data, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_CreateOIDCClientV2_Invalid_clientNameLang_Neg, endPoint=/v1/esignet/client-mgmt/oauth-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMID$V2", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "" }, output={ "errors": [ { "errorCode": "invalid_client_name_value" } ] }, inputTemplate=esignet/CreateOIDCClientV2/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client V2 with invalid clientNameLang, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_CreateOIDCClientV2_Invalid_langCode_Neg, endPoint=/v1/esignet/client-mgmt/oauth-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMID$V2S2", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "abc", "clientNameLang": "MOSIP OIDC Client" }, output={ "errors": [ { "errorCode": "invalid_language_code" } ] }, inputTemplate=esignet/CreateOIDCClientV2/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client V2 with invalid language code, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_CreateOIDCClientV2_Invalid_langCode_Size_Neg, endPoint=/v1/esignet/client-mgmt/oauth-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMID$V2", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "mhsdfsfd", "clientNameLang": "MOSIP OIDC Client" }, output={ "errors": [ { "errorCode": "invalid_language_code" } ] }, inputTemplate=esignet/CreateOIDCClientV2/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client V2 with invalid language code size, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_CreateOIDCClientV2_Missing_ClientNamelangMap_Neg, endPoint=/v1/esignet/client-mgmt/oauth-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMID$V2", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_client_name" } ] }, inputTemplate=esignet/CreateOIDCClientV2/CreateOIDCClientWOClientLangMap, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client V2 with missing ClientNamelangMap, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_CreateOIDCClientV2_Missing_ClientNamelangMap_Value_Neg, endPoint=/v1/esignet/client-mgmt/oauth-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMID$V2", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_client_name" } ] }, inputTemplate=esignet/CreateOIDCClientV2/CreateOIDCClientWOClientLangMapValue, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client V2 with missing clientNameLangMap value, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_CreateOIDCClientV2_all_Valid_Smoke_sid, endPoint=/v1/esignet/client-mgmt/oauth-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMID$V2", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "MOSIP OIDC Client" }, output={ "clientId": "$IGNORE$", "status": "ACTIVE" }, inputTemplate=esignet/CreateOIDCClientV2/CreateOIDCClient, outputTemplate=esignet/CreateOIDCClientV2/CreateOIDCClientResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client V2 with all valid data, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_UpdateOIDCClientV2_Invalid_clientNameLang_Neg, endPoint=/v1/esignet/client-mgmt/oauth-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClientV2_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "" }, output={ "errors": [ { "errorCode": "invalid_client_name_value" } ] }, inputTemplate=esignet/UpdateOIDCClientV2/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC Client V2 with invalid clientNameLang, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_UpdateOIDCClientV2_Invalid_langCode_Neg, endPoint=/v1/esignet/client-mgmt/oauth-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClientV2_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "abc", "clientNameLang": "MOSIP OIDC Client" }, output={ "errors": [ { "errorCode": "invalid_language_code" } ] }, inputTemplate=esignet/UpdateOIDCClientV2/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC Client V2 with invalid language code, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_UpdateOIDCClientV2_Invalid_langCode_Size_Neg, endPoint=/v1/esignet/client-mgmt/oauth-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClientV2_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "sdfsdgsdg", "clientNameLang": "MOSIP OIDC Client" }, output={ "errors": [ { "errorCode": "invalid_language_code" } ] }, inputTemplate=esignet/UpdateOIDCClientV2/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC Client V2 with invalid language code size, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_UpdateOIDCClientV2_Missing_ClientNamelangMap_Neg, endPoint=/v1/esignet/client-mgmt/oauth-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClientV2_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_client_name" } ] }, inputTemplate=esignet/UpdateOIDCClientV2/UpdateOIDCClientWOClientNameMap, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC Client V2 with missing clientNamelangMap, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_UpdateOIDCClientV2_Missing_ClientNamelangMap_Value_Neg, endPoint=/v1/esignet/client-mgmt/oauth-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClientV2_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_client_name" } ] }, inputTemplate=esignet/UpdateOIDCClientV2/UpdateOIDCClientWOClientNameMapValue, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC Client V2 with missing clientNamelangMap value, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_UpdateOIDCClientV2_all_Valid_Smoke, endPoint=/v1/esignet/client-mgmt/oauth-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClientV2_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "MOSIP OIDC Client" }, output={ "clientId": "$IGNORE$", "status": "ACTIVE" }, inputTemplate=esignet/UpdateOIDCClientV2/UpdateOIDCClient, outputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClientResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC Client V2 with all valid data, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_V2_uin_1stLang_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2_all_Valid_Smoke_sid_clientId$", "scope": "mosip_identity_vc_ldp", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code mosip:idp:acr:linked-wallet mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "$1STLANG$", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/OAuthDetailsRequestV2/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequestV2/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=To get OAuthDetails V2 with first language and all valid data, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_V2_uin_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2_all_Valid_Smoke_sid_clientId$", "scope": "mosip_identity_vc_ldp", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code mosip:idp:acr:linked-wallet mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/OAuthDetailsRequestV2/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequestV2/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=To get OAuthDetails V2 with all valid data, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_SunBirdR_CreatePolicy_NOAUTH_Valid_Smoke_Sid, endPoint=$SUNBIRDBASEURL$/api/v1/Insurance, role=resident, templateFields=null, input={ "policyNumber": "$POLICYNUMBERFORSUNBIRDRC$", "policyName": "Start Insurance Gold Premium", "policyExpiresOn": "2033-04-20T20:48:17.684Z", "policyIssuedOn": "$TIMESTAMP$", "fullName" : "$FULLNAMEFORSUNBIRDRC$", "dob" : "$DOBFORSUNBIRDRC$", "benefits": [{"benefits": "Critical Surgery"}, {"benefits": "Full body checkup"}], "gender": "Male", "mobile": "0123456789", "email": "abhishek@gmail.com" }, output={ "status": "SUCCESSFUL" }, inputTemplate=esignet/SunBirdR/CreatePolicySunBirdR/CreatePolicySunBirdR, outputTemplate=esignet/SunBirdR/CreatePolicySunBirdR/CreatePolicySunBirdRResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=To create a Policy for SunBirdR with all valid data and with no authorization, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:91)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_SunBirdR_GetPolicy_NOAUTH_Valid_Smoke, endPoint=$SUNBIRDBASEURL$/api/v1/Insurance/{insuranceid}, role=resident, templateFields=null, input={ "insuranceid": "$ID:SunBirdR_CreatePolicy_NOAUTH_Valid_Smoke_Sid_osid$" }, output={ "policyNumber": "$IGNORE$" }, inputTemplate=esignet/SunBirdR/GetPolicySunBirdR/GetPolicySunBirdR, outputTemplate=esignet/SunBirdR/GetPolicySunBirdR/GetPolicySunBirdRResult, restMethod=get, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=To delete policy for SunBirdR with no authorization, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.GetWithParam.test(GetWithParam.java:86)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_SunBirdR_SearchPolicy_NOAUTH_Valid_Smoke, endPoint=$SUNBIRDBASEURL$/api/v1/Insurance/search, role=resident, templateFields=null, input={ "offset": "0", "limit": "5", "fullName": "$FULLNAMEFORSUNBIRDRC$", "dob": "$DOBFORSUNBIRDRC$", "policyNumber": "$POLICYNUMBERFORSUNBIRDRC$" }, output={ }, inputTemplate=esignet/SunBirdR/SearchPolicySunBirdR/SearchPolicySunBirdR, outputTemplate=esignet/SunBirdR/SearchPolicySunBirdR/SearchPolicySunBirdRResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=To Search for the Policy with the policynumber and with no Authorization, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:86)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/client-mgmt/oauth-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMID$V2S3", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$OIDCJWKKEY4$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"},{acrValues: "mosip:idp:acr:knowledge"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "MOSIP OIDC Client" }, output={ "clientId": "$IGNORE$", "status": "ACTIVE" }, inputTemplate=esignet/SunBirdC/CreateOIDCClientV2SunBirdC/CreateOIDCClientV2SunBirdC, outputTemplate=esignet/SunBirdC/CreateOIDCClientV2SunBirdC/CreateOIDCClientV2SunBirdCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDCClientV2 for SunbirdC with all valid data, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:150)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_SunBirdC_all_Valid_Smoke_sid, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", "scope": "$SUNBIRD_SCOPE$", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/SunBirdC/OAuthDetailsRequestSunBirdC/OAuthDetailsRequestSunBirdC, outputTemplate=esignet/SunBirdC/OAuthDetailsRequestSunBirdC/OAuthDetailsRequestSunBirdCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=To Request OAuthDetails for SunBirdC with all valid data, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:150)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserSunBirdC_Valid_Smoke, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdC_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdC_all_Valid_Smoke_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBI", "challenge" : "$CHALLENGEVALUEFORSUNBIRDC$", "format": "base64url-encoded-json" }, output={ }, inputTemplate=esignet/SunBirdC/AuthenticateUserSunBirdC/AuthenticateUserSunBirdC, outputTemplate=esignet/SunBirdC/AuthenticateUserSunBirdC/AuthenticateUserSunBirdCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=To Authenticate the User for SunBirdC with all valid data, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:132)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_SunBirdC_All_Valid_Smoke_sid, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdC_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdC_all_Valid_Smoke_sid_transactionId$", "permittedAuthorizeScopes": [{scope: "$REMOVE$"}] }, output={ }, inputTemplate=esignet/SunBirdC/AuthorizationCodeSunBirdC/AuthorizationCodeSunBirdC, outputTemplate=esignet/SunBirdC/AuthorizationCodeSunBirdC/AuthorizationCodeSunBirdCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=To Authorize the user for SunBirdC with all valid data, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:150)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateTokenSunBirdC_Valid_Smoke_sid, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/oauth/v2/token, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_SunBirdC_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_USER4_JWK$", "redirect_uri": "$IDPREDIRECTURI$", "code_verifier": "$CODEVERIFIER$" }, output={ "token_type": "Bearer" }, inputTemplate=esignet/SunBirdC/GenerateTokenSunBirdC/GenerateTokenSunBirdC, outputTemplate=esignet/SunBirdC/GenerateTokenSunBirdC/GenerateTokenSunBirdCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=To Generate token for SunBirdC with all valid data, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:108)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_SunBirdCNegTC_Scen1_AuthCode_Valid_Smoke_sid, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", "scope": "$SUNBIRD_SCOPE$", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/SunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC, outputTemplate=esignet/SunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=To request OAuthDetails for SunBirdC with invalid AuthCode, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:150)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_SunBirdCNegTC_Scen1_Valid_Smoke_sid, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", "scope": "$SUNBIRD_SCOPE$", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/SunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC, outputTemplate=esignet/SunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=To request OAuthDetails for SunBirdC with invalid data, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:150)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_SunBirdCNegTC_Scen2_AuthCode_Valid_Smoke_sid, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", "scope": "$SUNBIRD_SCOPE$", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/SunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC, outputTemplate=esignet/SunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=To request OAuthDetails for SunBirdC with different different invalid AuthCode, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:150)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_SunBirdCNegTC_Scen2_Valid_Smoke_sid, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", "scope": "$SUNBIRD_SCOPE$", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/SunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC, outputTemplate=esignet/SunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=To request OAuthDetails for SunBirdC with different invalid data, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:150)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_SunBirdCNegTC_Scen3_AuthCode_Valid_Smoke_sid, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", "scope": "$SUNBIRD_SCOPE$", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/SunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC, outputTemplate=esignet/SunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=To request OAuthDetails for SunBirdC with different invalid AuthCode, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:150)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_SunBirdCNegTC_Scen3_Valid_Smoke_sid, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", "scope": "$SUNBIRD_SCOPE$", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/SunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC, outputTemplate=esignet/SunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=To request OAuthDetails for SunBirdC with different invalid data, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:150)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_SunBirdCNegTC_Scen4_AuthCode_Valid_Smoke_sid, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", "scope": "$SUNBIRD_SCOPE$", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/SunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC, outputTemplate=esignet/SunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=To request OAuthDetails for SunBirdC with different invalid Authcode, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:150)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_SunBirdCNegTC_Scen4_Valid_Smoke_sid, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", "scope": "$SUNBIRD_SCOPE$", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/SunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC, outputTemplate=esignet/SunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=To request OAuthDetails for SunBirdC with different invalid data, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:150)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_SunBirdCNegTC_Scen5_AuthCode_Valid_Smoke_sid, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", "scope": "$SUNBIRD_SCOPE$", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/SunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC, outputTemplate=esignet/SunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=To request OAuthDetails for SunBirdC with different invalid data, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:150)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_SunBirdCNegTC_Scen5_Valid_Smoke_sid, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", "scope": "$SUNBIRD_SCOPE$", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/SunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC, outputTemplate=esignet/SunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=To request OAuthDetails for SunBirdC with different invalid data, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:150)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_SunBirdCNegTC_Scen6_AuthCode_Valid_Smoke_sid, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", "scope": "$SUNBIRD_SCOPE$", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/SunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC, outputTemplate=esignet/SunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=To request OAuthDetails for SunBirdC with different invalid data, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:150)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_SunBirdCNegTC_Scen6_Valid_Smoke_sid, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", "scope": "$SUNBIRD_SCOPE$", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/SunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC, outputTemplate=esignet/SunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=To request OAuthDetails for SunBirdC with different invalid data, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:150)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_SunBirdCNegTC_Scen7_AuthCode_Valid_Smoke_sid, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", "scope": "$SUNBIRD_SCOPE$", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/SunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC, outputTemplate=esignet/SunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=To request OAuthDetails for SunBirdC with different invalid data, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:150)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_SunBirdCNegTC_Scen8_AuthCode_Valid_Smoke_sid, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", "scope": "$SUNBIRD_SCOPE$", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/SunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC, outputTemplate=esignet/SunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=To request OAuthDetails for SunBirdC with different invalid data, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:150)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_SunBirdCNegTC_all_Valid_Smoke_sid, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", "scope": "$SUNBIRD_SCOPE$", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/SunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC, outputTemplate=esignet/SunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=To request OAuthDetails for SunBirdC with invalid data, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:150)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_SunBirdC_With_only_challenge_method, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", "scope": "$SUNBIRD_SCOPE$", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$REMOVE$", "codeChallengeMethod": "S256" }, output={ "errors": [ { "errorCode": "invalid_pkce_challenge" } ] }, inputTemplate=esignet/SunBirdC/OAuthDetailsRequestSunBirdC/OAuthDetailsRequestSunBirdC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=To request OAuthDetails for SunBirdC with only challenge method, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:150)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_SunBirdC_With_only_code_challenge_with_scope, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", "scope": "$SUNBIRD_SCOPE$", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "$REMOVE$" }, output={ "errors": [ { "errorCode": "invalid_pkce_challenge" } ] }, inputTemplate=esignet/SunBirdC/OAuthDetailsRequestSunBirdC/OAuthDetailsRequestSunBirdC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=To request OAuthDetails for SunBirdC with only codeChallenge with scope, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:150)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_SunBirdC_all_Valid_Smoke_with_other_acrs, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", "scope": "$SUNBIRD_SCOPE$", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge mosip:idp:acr:generated-code mosip:idp:acr:linked-wallet mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/SunBirdC/OAuthDetailsRequestSunBirdC/OAuthDetailsRequestSunBirdC, outputTemplate=esignet/SunBirdC/OAuthDetailsRequestSunBirdC/OAuthDetailsRequestSunBirdCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=To request OAuthDetails for SunBirdC with all valid dataand with other acrs, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:150)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_SunBirdC_with_empty_challenege_data, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", "scope": "$SUNBIRD_SCOPE$", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en", "codeChallenge": " ", "codeChallengeMethod": " " }, output={ "errors": [ { "erroCode": "unsupported_pkce_challenge_method" } ] }, inputTemplate=esignet/SunBirdC/OAuthDetailsRequestSunBirdC/OAuthDetailsRequestSunBirdC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=unsupported_pkce_challenge_method,invalid_pkce_challenge, kycFields=null, description=To request OAuthDetails for SunBirdC with an empty codeChallenge data, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:150)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_SunBirdC_with_invalid_challenege_method, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", "scope": "$SUNBIRD_SCOPE$", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "@64gdbbjn" }, output={ "errors": [ { "errorCode": "unsupported_pkce_challenge_method" } ] }, inputTemplate=esignet/SunBirdC/OAuthDetailsRequestSunBirdC/OAuthDetailsRequestSunBirdC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=To request OAuthDetails for SunBirdC with invalid codeChallengeMethod, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:150)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_SunBirdC_with_invalid_scope_data, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", "scope": "anbcsh123", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ "errors": [ { "errorCode": "invalid_scope" } ] }, inputTemplate=esignet/SunBirdC/OAuthDetailsRequestSunBirdC/OAuthDetailsRequestSunBirdC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=To request OAuthDetails for SunBirdC with invalid scope value, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:150)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_SunBirdC_with_lengthy_codeChallenege_data, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", "scope": "$SUNBIRD_SCOPE$", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "9sJ3SSa1AfcYwqieyegdbdbdbdbhey373664gfgfbcbcbcncjccudhdyye7eyeggcbc374hfgdfdsbs98645g4gvgvv", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/SunBirdC/OAuthDetailsRequestSunBirdC/OAuthDetailsRequestSunBirdC, outputTemplate=esignet/SunBirdC/OAuthDetailsRequestSunBirdC/OAuthDetailsRequestSunBirdCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=To request OAuthDetails for SunBirdC with lenghty codeChallenge data, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:150)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_SunBirdC_with_opeind_scope_data, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", "scope": "openid profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/SunBirdC/OAuthDetailsRequestSunBirdC/OAuthDetailsRequestSunBirdC, outputTemplate=esignet/SunBirdC/OAuthDetailsRequestSunBirdC/OAuthDetailsRequestSunBirdCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=To request OAuthDetails for SunBirdC with openid scope data, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:150)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_SunBirdC_with_openid_profile_sunbird_data_Pos, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", "scope": "openid profile sunbird_rc_insurance_vc_ldp", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/SunBirdC/OAuthDetailsRequestSunBirdC/OAuthDetailsRequestSunBirdC, outputTemplate=esignet/SunBirdC/OAuthDetailsRequestSunBirdC/OAuthDetailsRequestSunBirdCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=To request OAuthDetails for SunBirdC with openid profile sunbird value in scope, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:150)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_SunBirdC_with_random_codeChallenege_data, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", "scope": "$SUNBIRD_SCOPE$", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "9sJ3SSa1AfcYwqi", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/SunBirdC/OAuthDetailsRequestSunBirdC/OAuthDetailsRequestSunBirdC, outputTemplate=esignet/SunBirdC/OAuthDetailsRequestSunBirdC/OAuthDetailsRequestSunBirdCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=To request OAuthDetails for SunBirdC with random codeChallenge data, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:150)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_SunBirdC_without_codeChallenege_and_with_sunbirdc_scope, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", "scope": "$SUNBIRD_SCOPE$", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$REMOVE$", "codeChallengeMethod": "S256" }, output={ "errors": [ { "errorCode": "invalid_pkce_challenge" } ] }, inputTemplate=esignet/SunBirdC/OAuthDetailsRequestSunBirdC/OAuthDetailsRequestSunBirdC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=To request OAuthDetails for SunBirdC with sunbirdc scope, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:150)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_SunBirdC_without_scope, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ "errors": [ { "errorCode": "invalid_scope" } ] }, inputTemplate=esignet/SunBirdC/OAuthDetailsRequestSunBirdC/OAuthDetailsRequestSunBirdC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=To request OAuthDetails for SunBirdC with all valid data and without scope, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:150)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_SunBirdC_without_scope_data, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", "scope": "", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ "errors": [ { "errorCode": "invalid_scope" } ] }, inputTemplate=esignet/SunBirdC/OAuthDetailsRequestSunBirdC/OAuthDetailsRequestSunBirdC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=To request OAuthDetails for SunBirdC with all valid data and without scope data, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:150)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserSunBirdCNegTC_Diff_Format1_Neg, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen3_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen3_Valid_Smoke_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBI", "challenge" : "$CHALLENGEVALUEFORSUNBIRDC$", "format": "alpha-numeric" }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ] }, inputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with different invalid formats, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:132)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserSunBirdCNegTC_Diff_Format2_Neg, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen4_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen4_Valid_Smoke_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBI", "challenge" : "$CHALLENGEVALUEFORSUNBIRDC$", "format": "encoded-json" }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ] }, inputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with different invalid formats, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:132)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserSunBirdCNegTC_Diff_Format3_Neg, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen5_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen5_Valid_Smoke_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBI", "challenge" : "$CHALLENGEVALUEFORSUNBIRDC$", "format": "number" }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ] }, inputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with different invalid formats, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:132)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserSunBirdCNegTC_Diff_Format4_Neg, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen6_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen6_Valid_Smoke_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBI", "challenge" : "$CHALLENGEVALUEFORSUNBIRDC$", "format": "jwt" }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ] }, inputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with different invalid formats, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:132)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserSunBirdCNegTC_Empty_AuthFactorType_Neg, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_Smoke_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "", "challenge" : "$CHALLENGEVALUEFORSUNBIRDC$", "format": "base64url-encoded-json" }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type" } ] }, inputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=invalid_auth_factor_type, kycFields=null, description=To Authenticate the user for SunBirdC with an empty authFactorType, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:132)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserSunBirdCNegTC_Empty_Challenge_Neg, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_Smoke_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBI", "challenge" : "", "format": "base64url-encoded-json" }, output={ "errors": [ { "errorCode": "invalid_challenge" } ] }, inputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=invalid_challenge, kycFields=null, description=To Authenticate the user for SunBirdC with an empty challenge, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:132)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserSunBirdCNegTC_Empty_Format_Neg, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_Smoke_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBI", "challenge" : "$CHALLENGEVALUEFORSUNBIRDC$", "format": "" }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ] }, inputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=invalid_challenge_format, kycFields=null, description=To Authenticate the user for SunBirdC with an empty challenge, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:132)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserSunBirdCNegTC_Empty_PolicyNum_Neg, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_Smoke_sid_transactionId$", "individualId": "", "authFactorType" : "KBI", "challenge" : "$CHALLENGEVALUEFORSUNBIRDC$", "format": "base64url-encoded-json" }, output={ "errors": [ { "errorCode": "invalid_identifier" } ] }, inputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with an empty policy number, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:132)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserSunBirdCNegTC_Empty_TransactionID_Neg, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "sgsfdg", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBI", "challenge" : "$CHALLENGEVALUEFORSUNBIRDC$", "format": "base64url-encoded-json" }, output={ "errors": [ { "errorCode": "invalid_transaction" } ] }, inputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with an empty transactionId, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:132)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserSunBirdCNegTC_Expired_TransactionID_Neg, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "LIqWka8p3F4ID2Z2X4Dnxqf57ixUZyHxGGrDe7R96p4", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBI", "challenge" : "$CHALLENGEVALUEFORSUNBIRDC$", "format": "base64url-encoded-json" }, output={ "errors": [ { "errorCode": "invalid_transaction" } ] }, inputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with an expired transactionId, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:132)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserSunBirdCNegTC_Invalid_AuthFactorType_Neg, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_Smoke_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "ads", "challenge" : "$CHALLENGEVALUEFORSUNBIRDC$", "format": "base64url-encoded-json" }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type" } ] }, inputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=invalid_challenge_length,, kycFields=null, description=To Authenticate the user for SunBirdC with invalid authFactorType, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:132)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserSunBirdCNegTC_Invalid_Challenge_Neg, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_Smoke_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBI", "challenge" : "eyJmdWxsTmFtZSI6IkthaWYgZGFmZHNmZCIsImRvYiI6IjIwMDAtMDctMjYifQ==", "format": "base64url-encoded-json" }, output={ "errors": [ { "errorCode": "auth_failed" } ] }, inputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with an invalid challenge, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:132)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserSunBirdCNegTC_Invalid_Encoded_Challenge_Neg, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_Smoke_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBI", "challenge" : "eyJmdWxsTmFtZSI6IkthaWYgZGFmZHNmZCIsImRvYiI6IjIwMDAtMDctMjYifQ==", "format": "base64url-encoded-json" }, output={ "errors": [ { "errorCode": "auth_failed" } ] }, inputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with invalid encoded challenge, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:132)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserSunBirdCNegTC_Invalid_Format_Neg, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen2_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen2_Valid_Smoke_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBI", "challenge" : "$CHALLENGEVALUEFORSUNBIRDC$", "format": "sdfgffgs" }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ] }, inputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with invalid format, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:132)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserSunBirdCNegTC_Invalid_PolicyNum_Neg, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_Smoke_sid_transactionId$", "individualId": "5adsf1", "authFactorType" : "KBI", "challenge" : "$CHALLENGEVALUEFORSUNBIRDC$", "format": "base64url-encoded-json" }, output={ "errors": [ { "errorCode": "auth_failed" } ] }, inputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with invalid policy number, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:132)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserSunBirdCNegTC_Invalid_TransactionID_Neg, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "sgsfdg", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBI", "challenge" : "$CHALLENGEVALUEFORSUNBIRDC$", "format": "base64url-encoded-json" }, output={ "errors": [ { "errorCode": "invalid_transaction" } ] }, inputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with invalid transactionId, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:132)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserSunBirdCNegTC_Missing_AuthFactorType_Neg, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_Smoke_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "$REMOVE$", "challenge" : "$CHALLENGEVALUEFORSUNBIRDC$", "format": "base64url-encoded-json" }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type" } ] }, inputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=invalid_auth_factor_type, kycFields=null, description=To Authenticate the user for SunBirdC with missing authFactorType, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:132)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserSunBirdCNegTC_Missing_Challenge_Neg, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_Smoke_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBI", "challenge" : "$REMOVE$", "format": "base64url-encoded-json" }, output={ "errors": [ { "errorCode": "invalid_challenge" } ] }, inputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=invalid_challenge, kycFields=null, description=To Authenticate the user for SunBirdC with missing challenge, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:132)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserSunBirdCNegTC_Missing_Format_Neg, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_Smoke_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBI", "challenge" : "$CHALLENGEVALUEFORSUNBIRDC$", "format": "$REMOVE$" }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ] }, inputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=invalid_challenge_format, kycFields=null, description=To Authenticate the user for SunBirdC with an empty challenge, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:132)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserSunBirdCNegTC_Missing_PolicyNum_Neg, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_Smoke_sid_transactionId$", "individualId": "$REMOVE$", "authFactorType" : "KBI", "challenge" : "$CHALLENGEVALUEFORSUNBIRDC$", "format": "base64url-encoded-json" }, output={ "errors": [ { "errorCode": "invalid_identifier" } ] }, inputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with missing policy number, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:132)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserSunBirdCNegTC_Missing_TransactionID_Neg, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$REMOVE$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBI", "challenge" : "$CHALLENGEVALUEFORSUNBIRDC$", "format": "base64url-encoded-json" }, output={ "errors": [ { "errorCode": "invalid_transaction" } ] }, inputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with missing transactionId, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:132)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserSunBirdCNegTC_Null_AuthFactorType_Neg, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_Smoke_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "null", "challenge" : "$CHALLENGEVALUEFORSUNBIRDC$", "format": "base64url-encoded-json" }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type" } ] }, inputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=invalid_challenge_length, kycFields=null, description=To Authenticate the user for SunBirdC with null value in authFactorType, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:132)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserSunBirdCNegTC_Null_Challenge_Neg, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_Smoke_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBI", "challenge" : "null", "format": "base64url-encoded-json" }, output={ "errors": [ { "errorCode": "invalid_challenge" } ] }, inputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with null value in challenge, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:132)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserSunBirdCNegTC_Null_Format_Neg, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen1_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen1_Valid_Smoke_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBI", "challenge" : "$CHALLENGEVALUEFORSUNBIRDC$", "format": "null" }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ] }, inputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with null value in format, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:132)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserSunBirdCNegTC_Null_PolicyNum_Neg, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_Smoke_sid_transactionId$", "individualId": "null", "authFactorType" : "KBI", "challenge" : "$CHALLENGEVALUEFORSUNBIRDC$", "format": "base64url-encoded-json" }, output={ "errors": [ { "errorCode": "auth_failed" } ] }, inputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with null value in policy number, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:132)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserSunBirdCNegTC_Other_AuthFactorType_Neg, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_Smoke_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "OTP", "challenge" : "$CHALLENGEVALUEFORSUNBIRDC$", "format": "base64url-encoded-json" }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ] }, inputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=invalid_challenge_length, kycFields=null, description=To Authenticate the user for SunBirdC with other authFactorType, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:132)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserSunBirdCNegTC_Random_Challenge_Neg, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_Smoke_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBI", "challenge" : "sfdgsfhsgjrtjysngfbfsnbsgfjhsgj", "format": "base64url-encoded-json" }, output={ "errors": [ { "errorCode": "invalid_challenge" } ] }, inputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with random challenge, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:132)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserSunBirdCNegTC_Scen1_AuthCode_Valid_Smoke, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen1_AuthCode_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen1_AuthCode_Valid_Smoke_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBI", "challenge" : "$CHALLENGEVALUEFORSUNBIRDC$", "format": "base64url-encoded-json" }, output={ }, inputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTC, outputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with invalid authcode, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:132)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserSunBirdCNegTC_Scen2_AuthCode_Valid_Smoke, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen2_AuthCode_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen2_AuthCode_Valid_Smoke_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBI", "challenge" : "$CHALLENGEVALUEFORSUNBIRDC$", "format": "base64url-encoded-json" }, output={ }, inputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTC, outputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with different invalid authcode, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:132)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserSunBirdCNegTC_Scen3_AuthCode_Valid_Smoke, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen3_AuthCode_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen3_AuthCode_Valid_Smoke_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBI", "challenge" : "$CHALLENGEVALUEFORSUNBIRDC$", "format": "base64url-encoded-json" }, output={ }, inputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTC, outputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with different invalid authcode, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:132)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserSunBirdCNegTC_Scen4_AuthCode_Valid_Smoke, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen4_AuthCode_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen4_AuthCode_Valid_Smoke_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBI", "challenge" : "$CHALLENGEVALUEFORSUNBIRDC$", "format": "base64url-encoded-json" }, output={ }, inputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTC, outputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with different invalid authcode, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:132)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserSunBirdCNegTC_Scen5_AuthCode_Valid_Smoke, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen5_AuthCode_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen5_AuthCode_Valid_Smoke_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBI", "challenge" : "$CHALLENGEVALUEFORSUNBIRDC$", "format": "base64url-encoded-json" }, output={ }, inputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTC, outputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with different invalid authcode, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:132)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserSunBirdCNegTC_Scen6_AuthCode_Valid_Smoke, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen6_AuthCode_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen6_AuthCode_Valid_Smoke_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBI", "challenge" : "$CHALLENGEVALUEFORSUNBIRDC$", "format": "base64url-encoded-json" }, output={ }, inputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTC, outputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with different invalid authcode, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:132)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserSunBirdCNegTC_Scen7_AuthCode_Valid_Smoke, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen7_AuthCode_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen7_AuthCode_Valid_Smoke_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBI", "challenge" : "$CHALLENGEVALUEFORSUNBIRDC$", "format": "base64url-encoded-json" }, output={ }, inputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTC, outputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with different invalid authcode, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:132)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserSunBirdCNegTC_Scen8_AuthCode_Valid_Smoke, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen8_AuthCode_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen8_AuthCode_Valid_Smoke_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBI", "challenge" : "$CHALLENGEVALUEFORSUNBIRDC$", "format": "base64url-encoded-json" }, output={ }, inputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTC, outputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with different invalid authcode, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:132)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserSunBirdCNegTC_SpaceVal_AuthFactorType_Neg, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_Smoke_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : " ", "challenge" : "$CHALLENGEVALUEFORSUNBIRDC$", "format": "base64url-encoded-json" }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type" } ] }, inputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=invalid_auth_factor_type, kycFields=null, description=To Authenticate the user for SunBirdC with space value in authFactorType, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:132)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserSunBirdCNegTC_SpaceVal_Challenge_Neg, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_Smoke_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBI", "challenge" : " ", "format": "base64url-encoded-json" }, output={ "errors": [ { "errorCode": "invalid_challenge" } ] }, inputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=invalid_challenge, kycFields=null, description=To Authenticate the user for SunBirdC with space value in challenge, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:132)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserSunBirdCNegTC_SpaceVal_Format_Neg, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_Smoke_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBI", "challenge" : "$CHALLENGEVALUEFORSUNBIRDC$", "format": " " }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ] }, inputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=invalid_challenge_format, kycFields=null, description=To Authenticate the user for SunBirdC with space value in format, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:132)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserSunBirdCNegTC_SpaceVal_PolicyNum_Neg, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_Smoke_sid_transactionId$", "individualId": " ", "authFactorType" : "KBI", "challenge" : "$CHALLENGEVALUEFORSUNBIRDC$", "format": "base64url-encoded-json" }, output={ "errors": [ { "errorCode": "invalid_identifier" } ] }, inputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with space value in policy number, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:132)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserSunBirdCNegTC_Used_TransactionID_Neg, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_Smoke_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBI", "challenge" : "$CHALLENGEVALUEFORSUNBIRDC$", "format": "base64url-encoded-json" }, output={ "errors": [ { "errorCode": "invalid_transaction" } ] }, inputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with already used transactionId, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:132)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserSunBirdCNegTC_Valid_Smoke, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_Smoke_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBI", "challenge" : "$CHALLENGEVALUEFORSUNBIRDC$", "format": "base64url-encoded-json" }, output={ }, inputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTC, outputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with invalid data, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:132)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_SunBirdCNegTC_All_Valid_Smoke_sid, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_Smoke_sid_transactionId$", "permittedAuthorizeScopes": [{scope: "$SUNBIRD_SCOPE$"}] }, output={ }, inputTemplate=esignet/SunBirdCNegTC/AuthorizationCodeSunBirdCNegTC/AuthorizationCodeSunBirdCNegTC, outputTemplate=esignet/SunBirdCNegTC/AuthorizationCodeSunBirdCNegTC/AuthorizationCodeSunBirdCNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with all valid data, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:150)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_SunBirdCNegTC_Comma_Separated_Scope_Pos, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen3_AuthCode_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen3_AuthCode_Valid_Smoke_sid_transactionId$", "permittedAuthorizeScopes": [{scope: "sunbird_rc_insurance_vc_ldp,openid profile"}] }, output={ }, inputTemplate=esignet/SunBirdCNegTC/AuthorizationCodeSunBirdCNegTC/AuthorizationCodeSunBirdCNegTC, outputTemplate=esignet/SunBirdCNegTC/AuthorizationCodeSunBirdCNegTC/AuthorizationCodeSunBirdCNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with comma separated scope, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:150)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_SunBirdCNegTC_Diff_Scope2_Pos, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen2_AuthCode_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen2_AuthCode_Valid_Smoke_sid_transactionId$", "permittedAuthorizeScopes": [{scope: "openid profile"}, {scope: "$SUNBIRD_SCOPE$"}] }, output={ }, inputTemplate=esignet/SunBirdCNegTC/AuthorizationCodeSunBirdCNegTC/AuthorizationCodeSunBirdCNegTC, outputTemplate=esignet/SunBirdCNegTC/AuthorizationCodeSunBirdCNegTC/AuthorizationCodeSunBirdCNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with multiple different scope, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:150)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_SunBirdCNegTC_Diff_Scope_Pos, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen1_AuthCode_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen1_AuthCode_Valid_Smoke_sid_transactionId$", "permittedAuthorizeScopes": [{scope: "openid profile"}] }, output={ }, inputTemplate=esignet/SunBirdCNegTC/AuthorizationCodeSunBirdCNegTC/AuthorizationCodeSunBirdCNegTC, outputTemplate=esignet/SunBirdCNegTC/AuthorizationCodeSunBirdCNegTC/AuthorizationCodeSunBirdCNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with different scope, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:150)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_SunBirdCNegTC_Empty_Scope_Neg, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen5_AuthCode_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen5_AuthCode_Valid_Smoke_sid_transactionId$", "permittedAuthorizeScopes": [{scope: ""}] }, output={ "errors": [ { "errorCode": "invalid_permitted_scope" } ] }, inputTemplate=esignet/SunBirdCNegTC/AuthorizationCodeSunBirdCNegTC/AuthorizationCodeSunBirdCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with an empty scope, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:150)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_SunBirdCNegTC_Invalid_Scope_Pos, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen7_AuthCode_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen7_AuthCode_Valid_Smoke_sid_transactionId$", "permittedAuthorizeScopes": [{scope: "sgsdfhg"}] }, output={ }, inputTemplate=esignet/SunBirdCNegTC/AuthorizationCodeSunBirdCNegTC/AuthorizationCodeSunBirdCNegTC, outputTemplate=esignet/SunBirdCNegTC/AuthorizationCodeSunBirdCNegTC/AuthorizationCodeSunBirdCNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with invalid scope, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:150)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_SunBirdCNegTC_Missing_Scope_Pos, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen4_AuthCode_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen4_AuthCode_Valid_Smoke_sid_transactionId$", "permittedAuthorizeScopes": [{scope: "$REMOVE$"}] }, output={ }, inputTemplate=esignet/SunBirdCNegTC/AuthorizationCodeSunBirdCNegTC/AuthorizationCodeSunBirdCNegTC, outputTemplate=esignet/SunBirdCNegTC/AuthorizationCodeSunBirdCNegTC/AuthorizationCodeSunBirdCNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with missing scope, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:150)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_SunBirdCNegTC_Null_Scope_Pos, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen8_AuthCode_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen8_AuthCode_Valid_Smoke_sid_transactionId$", "permittedAuthorizeScopes": [{scope: "null"}] }, output={ }, inputTemplate=esignet/SunBirdCNegTC/AuthorizationCodeSunBirdCNegTC/AuthorizationCodeSunBirdCNegTC, outputTemplate=esignet/SunBirdCNegTC/AuthorizationCodeSunBirdCNegTC/AuthorizationCodeSunBirdCNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with null value in scope, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:150)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_SunBirdCNegTC_SpaceVal_Scope_Neg, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen6_AuthCode_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen6_AuthCode_Valid_Smoke_sid_transactionId$", "permittedAuthorizeScopes": [{scope: " "}] }, output={ "errors": [ { "errorCode": "invalid_permitted_scope" } ] }, inputTemplate=esignet/SunBirdCNegTC/AuthorizationCodeSunBirdCNegTC/AuthorizationCodeSunBirdCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with space value in scope, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:150)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateTokenSunBirdCNegTC_Empty_Code_Verifier_Neg, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/oauth/v2/token, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_SunBirdCNegTC_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_USER4_JWK$", "redirect_uri": "$IDPREDIRECTURI$", "code_verifier": "" }, output={ "error": "invalid_pkce_code_verifier" }, inputTemplate=esignet/SunBirdCNegTC/GenerateTokenSunBirdCNegTC/GenerateTokenSunBirdCNegTC, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with an empty code_verifier value, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:108)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateTokenSunBirdCNegTC_Invalid_Code_Verifier_Neg, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/oauth/v2/token, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_SunBirdCNegTC_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_USER4_JWK$", "redirect_uri": "$IDPREDIRECTURI$", "code_verifier": "sdfgsfdhsfdhgfshfgsdgs" }, output={ "error": "pkce_failed" }, inputTemplate=esignet/SunBirdCNegTC/GenerateTokenSunBirdCNegTC/GenerateTokenSunBirdCNegTC, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with invalid code_verifier, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:108)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateTokenSunBirdCNegTC_Missing_Code_Verifier_Neg, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/oauth/v2/token, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_SunBirdCNegTC_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_USER4_JWK$", "redirect_uri": "$IDPREDIRECTURI$", "code_verifier": "$REMOVE$" }, output={ "error": "invalid_pkce_code_verifier" }, inputTemplate=esignet/SunBirdCNegTC/GenerateTokenSunBirdCNegTC/GenerateTokenSunBirdCNegTC, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with missing code_verifier, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:108)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateTokenSunBirdCNegTC_Null_Code_Verifier_Neg, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/oauth/v2/token, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_SunBirdCNegTC_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_USER4_JWK$", "redirect_uri": "$IDPREDIRECTURI$", "code_verifier": "null" }, output={ "error": "pkce_failed" }, inputTemplate=esignet/SunBirdCNegTC/GenerateTokenSunBirdCNegTC/GenerateTokenSunBirdCNegTC, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with null value in code_verifier, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:108)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateTokenSunBirdCNegTC_SpaceVal_Code_Verifier_Neg, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/oauth/v2/token, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_SunBirdCNegTC_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_USER4_JWK$", "redirect_uri": "$IDPREDIRECTURI$", "code_verifier": " " }, output={ "error": "pkce_failed" }, inputTemplate=esignet/SunBirdCNegTC/GenerateTokenSunBirdCNegTC/GenerateTokenSunBirdCNegTC, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with space value in code_verifier, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:108)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateTokenSunBirdCNegTC_Valid_Smoke_sid, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/oauth/v2/token, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_SunBirdCNegTC_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_USER4_JWK$", "redirect_uri": "$IDPREDIRECTURI$", "code_verifier": "$CODEVERIFIER$" }, output={ "token_type": "Bearer" }, inputTemplate=esignet/SunBirdCNegTC/GenerateTokenSunBirdCNegTC/GenerateTokenSunBirdCNegTC, outputTemplate=esignet/SunBirdCNegTC/GenerateTokenSunBirdCNegTC/GenerateTokenSunBirdCNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with invalid data, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:108)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_SunBirdR_DeletePolicy_NOAUTH_Valid_Smoke, endPoint=$SUNBIRDBASEURL$/api/v1/Insurance/{insuranceid}, role=resident, templateFields=null, input={ "insuranceid": "$ID:SunBirdR_CreatePolicy_NOAUTH_Valid_Smoke_Sid_osid$" }, output={ "status": "SUCCESSFUL" }, inputTemplate=esignet/SunBirdR/DeletePolicySunBirdR/DeletePolicySunBirdR, outputTemplate=esignet/SunBirdR/DeletePolicySunBirdR/DeletePolicySunBirdRResult, restMethod=delete, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=To delete policy for SunBirdR with no authorization, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:252)
at io.mosip.testrig.apirig.esignet.testscripts.DeleteWithParam.test(DeleteWithParam.java:81)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:219)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |